1
0
mirror of https://github.com/strongdm/comply synced 2024-12-23 14:07:34 +00:00

automated asset refresh (via Makefile)

This commit is contained in:
Justin McCarthy 2018-05-18 11:38:23 -07:00
parent f6410c6fb9
commit d79d9a934b
No known key found for this signature in database
GPG Key ID: 900437410E142A48
5 changed files with 435 additions and 57 deletions

View File

@ -137,7 +137,7 @@ func complyBlankReadmeMd() (*asset, error) {
return nil, err
}
info := bindataFileInfo{name: "comply-blank/README.md", size: 1965, mode: os.FileMode(420), modTime: time.Unix(1526624477, 0)}
info := bindataFileInfo{name: "comply-blank/README.md", size: 1965, mode: os.FileMode(420), modTime: time.Unix(1526668702, 0)}
a := &asset{bytes: bytes, info: info}
return a, nil
}
@ -157,7 +157,7 @@ func complyBlankTodoMd() (*asset, error) {
return nil, err
}
info := bindataFileInfo{name: "comply-blank/TODO.md", size: 1429, mode: os.FileMode(420), modTime: time.Unix(1526624477, 0)}
info := bindataFileInfo{name: "comply-blank/TODO.md", size: 1429, mode: os.FileMode(420), modTime: time.Unix(1526668702, 0)}
a := &asset{bytes: bytes, info: info}
return a, nil
}
@ -277,7 +277,7 @@ func complyBlankTemplatesDefaultLatex() (*asset, error) {
return nil, err
}
info := bindataFileInfo{name: "comply-blank/templates/default.latex", size: 7649, mode: os.FileMode(420), modTime: time.Unix(1526624477, 0)}
info := bindataFileInfo{name: "comply-blank/templates/default.latex", size: 7649, mode: os.FileMode(420), modTime: time.Unix(1526668702, 0)}
a := &asset{bytes: bytes, info: info}
return a, nil
}
@ -297,7 +297,7 @@ func complyBlankTemplatesIndexAce() (*asset, error) {
return nil, err
}
info := bindataFileInfo{name: "comply-blank/templates/index.ace", size: 7596, mode: os.FileMode(420), modTime: time.Unix(1526624477, 0)}
info := bindataFileInfo{name: "comply-blank/templates/index.ace", size: 7596, mode: os.FileMode(420), modTime: time.Unix(1526668702, 0)}
a := &asset{bytes: bytes, info: info}
return a, nil
}
@ -317,7 +317,7 @@ func complySoc2ReadmeMd() (*asset, error) {
return nil, err
}
info := bindataFileInfo{name: "comply-soc2/README.md", size: 1965, mode: os.FileMode(420), modTime: time.Unix(1526624477, 0)}
info := bindataFileInfo{name: "comply-soc2/README.md", size: 1965, mode: os.FileMode(420), modTime: time.Unix(1526668702, 0)}
a := &asset{bytes: bytes, info: info}
return a, nil
}
@ -337,7 +337,7 @@ func complySoc2TodoMd() (*asset, error) {
return nil, err
}
info := bindataFileInfo{name: "comply-soc2/TODO.md", size: 1429, mode: os.FileMode(420), modTime: time.Unix(1526624477, 0)}
info := bindataFileInfo{name: "comply-soc2/TODO.md", size: 1429, mode: os.FileMode(420), modTime: time.Unix(1526668702, 0)}
a := &asset{bytes: bytes, info: info}
return a, nil
}
@ -357,7 +357,7 @@ func complySoc2NarrativesReadmeMd() (*asset, error) {
return nil, err
}
info := bindataFileInfo{name: "comply-soc2/narratives/README.md", size: 96, mode: os.FileMode(420), modTime: time.Unix(1526624477, 0)}
info := bindataFileInfo{name: "comply-soc2/narratives/README.md", size: 96, mode: os.FileMode(420), modTime: time.Unix(1526668702, 0)}
a := &asset{bytes: bytes, info: info}
return a, nil
}
@ -377,7 +377,7 @@ func complySoc2NarrativesControlMd() (*asset, error) {
return nil, err
}
info := bindataFileInfo{name: "comply-soc2/narratives/control.md", size: 387, mode: os.FileMode(420), modTime: time.Unix(1526624477, 0)}
info := bindataFileInfo{name: "comply-soc2/narratives/control.md", size: 387, mode: os.FileMode(420), modTime: time.Unix(1526668702, 0)}
a := &asset{bytes: bytes, info: info}
return a, nil
}
@ -397,7 +397,7 @@ func complySoc2NarrativesOrganizationalMd() (*asset, error) {
return nil, err
}
info := bindataFileInfo{name: "comply-soc2/narratives/organizational.md", size: 2378, mode: os.FileMode(420), modTime: time.Unix(1526624477, 0)}
info := bindataFileInfo{name: "comply-soc2/narratives/organizational.md", size: 2378, mode: os.FileMode(420), modTime: time.Unix(1526668702, 0)}
a := &asset{bytes: bytes, info: info}
return a, nil
}
@ -417,7 +417,7 @@ func complySoc2NarrativesProductsMd() (*asset, error) {
return nil, err
}
info := bindataFileInfo{name: "comply-soc2/narratives/products.md", size: 232, mode: os.FileMode(420), modTime: time.Unix(1526624477, 0)}
info := bindataFileInfo{name: "comply-soc2/narratives/products.md", size: 232, mode: os.FileMode(420), modTime: time.Unix(1526668702, 0)}
a := &asset{bytes: bytes, info: info}
return a, nil
}
@ -437,7 +437,7 @@ func complySoc2NarrativesSecurityMd() (*asset, error) {
return nil, err
}
info := bindataFileInfo{name: "comply-soc2/narratives/security.md", size: 327, mode: os.FileMode(420), modTime: time.Unix(1526624477, 0)}
info := bindataFileInfo{name: "comply-soc2/narratives/security.md", size: 327, mode: os.FileMode(420), modTime: time.Unix(1526668702, 0)}
a := &asset{bytes: bytes, info: info}
return a, nil
}
@ -457,7 +457,7 @@ func complySoc2NarrativesSystemMd() (*asset, error) {
return nil, err
}
info := bindataFileInfo{name: "comply-soc2/narratives/system.md", size: 257, mode: os.FileMode(420), modTime: time.Unix(1526624477, 0)}
info := bindataFileInfo{name: "comply-soc2/narratives/system.md", size: 257, mode: os.FileMode(420), modTime: time.Unix(1526668702, 0)}
a := &asset{bytes: bytes, info: info}
return a, nil
}
@ -477,7 +477,7 @@ func complySoc2PoliciesReadmeMd() (*asset, error) {
return nil, err
}
info := bindataFileInfo{name: "comply-soc2/policies/README.md", size: 71, mode: os.FileMode(420), modTime: time.Unix(1526624477, 0)}
info := bindataFileInfo{name: "comply-soc2/policies/README.md", size: 71, mode: os.FileMode(420), modTime: time.Unix(1526668702, 0)}
a := &asset{bytes: bytes, info: info}
return a, nil
}
@ -497,12 +497,12 @@ func complySoc2PoliciesAccessMd() (*asset, error) {
return nil, err
}
info := bindataFileInfo{name: "comply-soc2/policies/access.md", size: 200, mode: os.FileMode(420), modTime: time.Unix(1526624477, 0)}
info := bindataFileInfo{name: "comply-soc2/policies/access.md", size: 200, mode: os.FileMode(420), modTime: time.Unix(1526668702, 0)}
a := &asset{bytes: bytes, info: info}
return a, nil
}
var _complySoc2PoliciesApplicationMd = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x1c\x8b\xb1\x8a\xc3\x30\x10\x05\xfb\xfd\x8a\x07\x57\xeb\x38\xbb\x38\x82\x3a\xa3\x2a\xa9\x4c\x94\x1f\x58\x64\x25\x6c\xb0\x76\x8d\x25\x07\xfc\xf7\xc1\xae\x06\x86\x19\xe5\x92\x3d\x86\x65\x99\x25\x71\x13\x53\xc4\x9c\xb6\x55\xda\x8e\xd1\x66\x49\x3b\x71\x5a\x4d\xf7\xe2\x31\xc4\x91\x2a\x37\xa9\x4f\xc9\xd5\x13\xf0\x88\xe1\x00\xe0\x10\xc2\xff\x6f\x4f\x85\xdf\xb6\xde\xf3\x47\xaa\x98\x9e\x89\xc3\xc4\x2d\x7b\xdc\x36\x45\x87\xfe\xaf\xbb\x9c\x43\xb2\x52\xb2\x36\x8f\xab\x4a\x13\x9e\x31\x59\xda\x0e\x43\xce\x39\xa2\x1f\x04\x2b\xa2\x2f\x44\x33\xfd\x06\x00\x00\xff\xff\x42\x28\xec\xa1\xa2\x00\x00\x00")
var _complySoc2PoliciesApplicationMd = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xc4\x59\xcd\x72\xe4\xc6\x91\xbe\xf3\x29\x32\x62\x2f\xc3\x88\x66\x6b\xa5\xd8\xd8\x50\x8c\x4e\xdc\x19\xad\x45\x87\xa4\x19\x73\xc6\xd6\xb9\xba\x2a\xd1\x48\xb1\x50\x05\xd5\x4f\x37\xa1\x93\x5f\xc3\xaf\xe7\x27\x71\x64\x56\x01\x28\x34\x9b\xb2\x1c\x3e\xf8\xc4\x60\x03\x95\x95\xbf\x5f\x7e\x99\x70\x6a\xc0\xb7\x70\x3f\x8e\x96\xb4\x4a\xe4\x1d\x7c\x42\x9d\x03\xa5\x09\x3e\x7a\x4b\x7a\xba\x51\x3a\x78\x37\x0d\x6f\xe1\xfe\xd3\xc7\x9b\xa8\x12\xc5\x8e\x30\xbe\xbd\x01\xf8\xfc\xe9\x1d\xff\x01\xb8\x83\x77\xef\xfe\x77\xff\xd5\xcd\xa0\x7e\xf6\xe1\x11\x4f\x14\xc9\x3b\x79\xe5\x0e\x8c\x4a\xf8\x16\xfe\x98\x1d\x7c\x09\x5f\xfd\xf7\x97\x5f\xcb\x01\xed\x87\x01\x5d\x7a\x0b\x0f\x8e\x12\x29\x0b\xc6\xeb\xcc\xbf\xdc\xdc\xdd\xdd\xdd\xdc\xfc\x17\x7c\xcc\x61\xf4\x11\x41\x39\x03\x9f\xb4\x1f\xf1\xe6\x46\xed\xe1\x73\x4f\x11\x54\xa3\x6b\x9c\x75\x1d\x45\x57\x30\xd8\x91\xc3\x08\xa9\xc7\xf5\x59\x17\xd4\x80\x67\x1f\x9e\x44\x5a\xc0\x5f\x32\x05\xe4\xcb\x22\x74\x3e\xb4\xf2\xe2\x0e\x9c\x4f\xea\x60\x27\x38\xe3\xe1\xe2\xc9\x99\x52\x4f\x4e\x44\xfb\x70\x54\x8e\x7e\x95\x27\x7f\xff\xeb\xdf\x22\x8c\xc1\x9b\xac\x45\x25\x74\x27\x0a\xde\xb1\xfc\xfd\xaa\xf4\x6c\x1f\x28\x1b\x3d\xbf\x7e\x22\x83\x11\x68\x18\xad\xa8\x42\xee\x08\xda\xbb\x14\xbc\x8d\xa2\x26\xb9\x98\x42\x11\x59\xd4\xbc\x50\x68\x31\x6f\x07\xc9\x03\x39\x6d\xb3\x41\x18\x31\x90\x37\xa4\xe1\x94\xad\xc3\xa0\x0e\x64\xd9\x03\x51\x2b\x57\xc4\xfa\xd4\x63\x80\x34\x8d\x18\xc1\x77\x80\x27\x65\x73\x31\x50\x1e\xab\x18\x31\x46\xf1\x4d\xa3\x7c\x75\xae\xdc\xce\xce\xf5\xa0\xac\xdd\x78\xe7\x37\x9c\xf3\x8a\x6f\x76\xa0\x22\x9c\x91\xe5\x44\x50\x66\x20\x47\x31\x05\x95\x7c\x28\x9a\xe4\x88\x41\x54\x4c\x3d\x72\x1e\x34\x97\x55\xad\xd2\x34\x92\x56\xd6\x4e\xb3\xf5\x11\x70\x18\xad\x9f\x10\x8b\x08\xf1\xa7\xd2\x2c\x72\xcf\x39\xf5\x7f\x4a\x3f\x1d\x83\xcf\xce\x88\x69\x6d\xce\xb7\xee\x12\x13\x17\xd9\x4a\x6b\x9f\x5d\x92\x10\xb0\x75\x56\x85\x23\xc6\x04\x2e\x0f\x07\x0c\xac\x20\xd5\x14\x56\x29\x29\xfd\x04\x27\xd4\xc5\x88\x2e\x61\x80\x41\xd9\xb3\x0a\x08\xe4\x3a\xd4\x55\xfb\xfb\x08\x0a\x02\xc6\x6c\xd3\x0e\x28\x01\x49\x1e\xf8\x90\x94\x4b\x90\x7a\x95\xb6\xae\xe5\xe3\x06\x23\x1d\x1d\x1a\xf1\xf3\x9a\xd9\xe4\x60\x20\x67\x76\x62\xae\x9c\x4c\x3d\x4e\x72\x82\x43\xce\x07\x66\x47\x90\xcb\x3e\x47\x3b\xc1\xe0\x1d\x25\x1f\xd0\x88\x49\x83\xb2\xa4\xc9\xe7\x08\x4a\x27\x3a\xb1\x50\x91\xa3\x7d\xb6\x9c\x84\x86\xd5\x40\x50\x10\xa7\x98\x70\xe0\xc2\x1d\x83\x1f\x28\xe2\x1e\xde\x53\xd4\xfe\x84\x61\x92\x4b\x62\x3e\x44\xfc\x25\x73\x8e\x0f\x94\xe8\x58\x1c\xeb\xbb\x4d\xd2\x5e\xfa\xf9\x4c\xd6\x82\xa5\x81\xd2\xf5\xba\xaa\x3e\x8d\x39\x74\x4a\x63\xb1\x13\x5d\xcc\x81\x43\x0c\x07\x15\xd1\x92\x43\xb0\x78\x42\xcb\x77\x2d\x9e\x61\xd0\x8a\x51\xf2\xb4\x68\x5e\xf3\xf9\xc1\x81\x32\x86\x44\x99\xe4\x8b\x97\xb8\xf6\x8e\x99\x8c\x72\x7c\x45\x6a\x33\x9e\x8b\x75\xc1\x14\xd4\xbd\xe3\xac\xd8\x42\x08\xab\x34\x06\xaf\xd1\x88\x56\x2c\xb5\x68\xf8\x4a\x28\xc7\xe0\x47\x0c\x76\x82\x5e\x05\x83\x1c\x22\x72\x92\x65\x41\x14\xb8\x88\xf0\x81\x73\x6d\xe4\x2c\x26\x8d\x25\x8d\x1f\xb1\xc3\x80\x4e\x63\x14\x8b\xde\xab\xa4\xe0\x9d\x55\x31\x52\x37\xbb\xb9\x22\x37\x3f\xfe\xf0\xd3\xfd\xa7\x8f\xf0\x48\xf1\x09\x1e\x95\xc0\xcc\x0f\x98\x7a\x6f\xbc\xf5\xc7\xf6\x8d\xcf\x18\xe5\xe9\x1f\x32\x19\x6c\x7f\xf7\x23\x7c\x46\x07\x1f\x83\xff\x19\x75\x12\x6c\x5e\xa5\x7f\xbe\x08\x1a\x0c\x39\xa6\xad\xfd\x97\x48\x41\x09\x0c\x87\xcb\x8f\xe2\xbb\x2f\x18\x81\xb5\xf8\xb3\xf8\x47\x4c\x47\x3b\x71\xd6\x76\x74\xcc\xa1\x26\xf1\xa0\x9c\x3a\xa2\xd9\x2f\xf7\x76\xde\x5a\x7f\x66\x9d\x5f\xf1\x56\x51\xe6\x80\x2c\x29\x92\xc1\x2a\x69\x07\xd4\x41\x87\x2a\xd2\xc1\x72\x4a\x09\xaa\x19\x81\x21\x18\x54\x4a\xa5\xaa\x39\x1d\x1b\xbd\x25\x1b\x97\x7b\x4a\x39\xbe\xbd\x91\x5e\x46\x35\x06\xbd\x72\xc6\x6e\x95\x85\xc3\x74\x29\x68\x55\xaa\x86\xec\x7a\x02\xf0\xa9\xd7\x23\x0b\x6f\xc2\x9c\x04\xf0\x46\xdd\xde\xee\x17\x4d\x1e\x5e\x68\x5e\x92\x93\x71\xbd\x78\xd4\x70\xb7\x51\x96\x11\xc9\x87\x41\x5e\xd9\x81\xda\x3e\x0b\xc8\xda\xc0\x81\x21\x24\x2c\x1a\x4b\xe1\x3b\x74\xc9\x4e\x60\x28\x8e\x56\x4d\x8c\x48\x3d\xe9\x1e\x7a\x3a\xf6\x96\x8e\x7d\x2a\xbd\x97\x1b\x0c\x7b\x71\x23\xd5\xb0\x3d\x07\xe4\x88\x29\x2d\x2a\x19\x78\x83\xfb\xe3\x7e\xc7\x7d\x2b\x7a\xc7\x80\x7b\x57\x5e\xef\x48\x1d\x2c\xb6\x4a\xc2\x9b\x8f\x0f\x0f\xb7\x3b\xd6\x22\xa1\x4e\x68\xa0\x47\x65\x53\x7f\xf1\xce\x77\xfc\x0e\x26\xbd\xbf\x5d\x7c\xf2\x09\x5d\xa4\x44\x27\x14\x0d\x76\x80\x71\x44\x4d\x82\xee\xa2\x92\xfc\xdb\x55\xbc\x0f\x18\x53\x20\x91\x7f\x98\xc0\xaa\x33\xf8\x30\xc3\x41\x55\x36\x7a\x3e\xbd\x66\x43\x69\x05\x71\x07\xa3\x8a\xf1\xec\x83\x89\x05\xa8\x74\x40\x43\x09\xb4\x0a\x46\x2e\xba\x85\xd8\x0b\xac\x3a\x2f\xfe\x5c\x7d\x48\x0e\x46\xab\xc8\x25\x7c\x4e\x6b\x2c\xbf\x7d\x0d\x46\x4e\xca\x12\xd3\x2a\x20\x37\xe6\xb4\x22\x4a\xa1\x37\x45\x7f\x3a\xa1\x9d\x76\x5c\x7e\xa5\x46\xbc\xb3\x9c\x8b\xcc\xa9\x96\xee\x5f\x8e\x17\xf9\x01\xe1\xc9\xf9\xb3\xa0\xa2\x94\x4c\x08\xa8\xd3\x1e\xbe\x7d\x56\xcc\x51\xe2\xdc\x64\x77\x70\xc8\xe5\x75\xb6\x42\xa0\x1b\x0d\x1f\x12\xc0\xbd\x8b\x94\xb8\xf7\x04\x1a\x19\x4d\xf8\xe5\xae\xe3\x82\x3a\x61\xe8\xac\x3f\x03\x86\xe0\x43\xf5\x0f\xb9\x9f\x4b\x4f\x84\xce\xaa\x73\xfc\x1d\x86\xe3\x33\xea\x9c\x66\x0c\x2d\xc2\x4a\xdd\x09\x0c\xf8\x72\xa4\xdc\x51\x7a\x0b\x2b\x59\xd9\x16\x18\x4c\x8a\xb8\x42\x6b\x2f\x6b\x13\x87\x39\x8d\x83\xec\xc6\x40\x27\xb2\xc8\xb5\xcb\x0c\x64\x07\x06\xdd\x04\x11\xc3\x89\xb8\x39\xd0\x30\x2a\x0a\x6b\xe8\x07\xd4\xbd\x72\x14\x87\xb8\xe3\x3c\xd1\x41\xc5\x52\xbb\xe5\x8a\xd5\xa4\x9f\x7a\x64\xec\xf7\x71\x46\x9d\x9c\x7a\x1f\xe8\x57\xac\xa5\x20\x0a\xb4\xa6\x1e\x26\x50\x5d\x47\x96\x6a\x85\x0e\x28\x49\xd6\xd3\xc8\x17\x15\xa2\x53\x78\x54\x50\x85\xd3\xf5\xca\xf1\x29\xee\xd9\x27\x32\x59\xd9\x3d\x83\xb6\x58\xae\x1c\x5f\xe8\x07\xc5\xb1\x0a\x78\x22\x3c\x4b\x67\xae\x4a\xd4\x2b\xbd\x13\x5e\x72\xcc\x56\x05\xee\xad\xc4\xa4\x77\xa3\xf7\xef\x09\x91\xd3\x61\x1a\x53\xa9\x2c\x95\x24\x1f\x6b\xb4\x21\x05\xc5\x95\xd8\xa0\xd5\x4c\x7f\x37\x80\x65\xfd\xf1\xc8\xf1\x4c\x5e\x5c\x89\xcf\x89\xdf\xa8\xb0\xce\x66\x3d\x72\x20\xe5\x3d\x49\x63\x6e\x31\x85\x2e\x0a\x85\x2d\xfe\xc4\xd3\x4a\xf0\x13\x58\x54\x31\xc1\x97\xff\x03\x46\x4d\x4d\xa2\xfd\x29\x2b\x5b\x20\x78\x44\x3e\xaf\xbd\x63\xaa\xba\xc6\xb7\xf8\x2a\x16\x28\x33\x08\x45\x1e\xe7\x15\x0a\x30\x70\x1b\x10\xe8\x10\x50\x1c\xbc\x29\xd2\x5a\x8f\x7c\x03\xa3\x0a\x89\x34\x7b\x95\x2b\xb2\xd6\xa0\x38\xae\x63\x52\x28\x46\x6a\x6f\x6d\x29\x86\x1d\xdb\xb2\x9b\x5b\x63\xc5\x88\xab\x58\xba\x87\xf7\xeb\x54\x61\x85\xc0\x71\x04\x92\x7a\x42\x77\xd5\xc7\xc0\xc9\x7a\xc4\xda\x9d\x86\xe2\x55\x69\x0e\x62\x57\x79\x2a\xa9\x88\xcf\x54\xe8\x40\xf4\x5d\x12\x02\xbb\x21\xe0\x2b\xb4\x26\xe5\x0c\xe3\xdb\xdc\xac\x17\xd6\xf7\x5a\xdb\x9b\x07\x21\x34\x7b\x58\xfb\x27\x76\x2a\xdb\xb4\x02\x28\xfb\xc0\xb4\x43\x45\x23\x6a\x07\x31\xeb\x9e\xfb\xb5\x04\x63\x1d\x1d\x18\xe1\xeb\x0c\x05\xa3\x72\x68\x23\x87\x88\x51\xf5\x58\xf5\x92\xd6\xca\xae\x63\xe6\xd8\xf0\x03\x31\xdc\x00\x0d\x03\x1a\x52\x89\xd9\x47\x1e\xbd\x93\x21\x4c\x59\x2b\x87\x57\xa3\xef\xdb\x7c\x17\x19\x95\x10\x0a\x3b\xb6\xf8\xdc\xd8\x71\xa5\xb5\xeb\x1c\x02\xbb\xfe\x35\xd6\xf2\x66\xc9\xd7\xaf\x59\x33\xfe\x9d\x73\x93\x13\x1e\xdd\x31\xf5\x3b\xbe\xe6\x40\x6e\x25\xd8\x76\xec\x95\xcb\x03\x06\xd2\x90\xc7\x11\xc3\x17\xd6\x9f\x31\x68\x15\xb1\x95\x20\x2c\x7d\x1a\x0e\xde\xc6\x86\x31\xbc\xcf\x81\x03\x5d\x39\x59\x49\x14\x9e\x26\x0a\x1f\xdc\x6d\xab\x5b\xac\x65\x4c\xed\xd5\xa9\x85\x2e\x3b\x77\xd7\x42\xcf\x0a\xda\xbd\xa0\xbe\x95\xe7\x19\xe8\x82\x1f\x40\x31\xd5\x0e\x46\xca\x63\x5a\x83\xaa\xe0\x84\xce\xf8\xb0\xb2\xab\x0f\xdc\xba\x36\xc2\x96\x96\x15\xf3\xc8\x83\x53\x69\xd6\x8c\x72\x23\x83\x3d\x9a\x2a\x03\x62\xcf\x95\x51\xb8\x8b\x5e\xa8\x24\x27\xd7\xea\x80\xff\xcf\x3c\x24\x14\x41\xcb\xcc\xb8\x26\x87\x0a\xa1\x64\xc7\xc2\xcb\x36\x03\x4d\xb9\x87\x33\xb1\xcb\x32\xcb\x74\x78\xa7\x27\x6d\x17\xdd\xd6\x8b\x7e\xf4\xa0\x73\x4c\x7e\xa8\x40\xb1\x38\x55\x4d\x72\x51\x25\xa2\x15\xf6\xda\x5b\xf8\x6a\x9f\x53\xa9\xb2\xa5\x65\xd5\x79\x6f\xd6\x41\x2b\x37\x4f\x7a\xc8\x42\xe6\xb6\xf7\x42\x8f\x3f\x8f\x4c\x1e\x84\xaf\x24\xdd\xaf\xc3\x72\x53\xc0\x33\x14\x50\x8c\x79\xa5\xb1\x97\x4e\x5d\xb6\x17\x85\x3e\x47\xcf\x1d\x24\x5e\xe9\x16\xf7\xc5\x39\x4d\xe7\xd9\xa4\x86\x33\x60\x49\xa3\xe3\x9a\x5c\x84\x97\x5a\x12\xd1\x73\x3d\x28\xe7\x32\x93\x34\xd9\x1d\x70\xda\xb0\xa8\xb9\x61\x2d\x48\x55\x31\xbb\x66\xe2\xc5\x1a\x67\x0d\xab\x6c\x3a\xd0\xd4\xf2\x6c\xfa\xcd\x3a\x57\xe8\x40\x09\x03\xa9\x35\x15\x7f\x2c\xb0\x2f\x7b\xae\x4d\x84\x02\xb2\x8a\x33\xa6\x94\xea\x28\x46\xaf\x2b\x15\x18\x03\xf9\x50\x3b\x7d\xf0\x27\x65\x67\xa0\xac\xb8\x3c\x83\xd7\x8c\x91\x45\x74\xed\x04\xf5\x06\xc6\xb3\xa2\xe7\xab\x3b\xa7\xaa\xeb\x67\xae\xae\x3b\xa9\x2e\x58\x87\x2c\x73\xc5\x1d\xff\x4c\x5d\x83\x33\xdb\x68\x90\x7f\x75\xf7\x4b\xcb\x6b\x21\x8e\x81\x64\x79\xb0\x88\x94\xc0\x19\x4c\x18\x78\x90\x58\xf2\xea\xc5\xd8\xdf\x32\xb3\x95\x6b\x49\xd7\x0a\xbb\x3a\x21\x57\xd2\xde\xac\xb0\x96\x78\xc9\x62\xc0\x80\x77\xdb\x3d\x60\xa0\xf8\xc4\xb2\x19\x9c\x5c\x82\xda\x59\xe6\x54\x1f\x94\xc1\x2b\xb5\x27\xfa\x74\xd9\x89\xa3\x95\x6c\xd3\xe6\xa9\x35\xe8\x9e\x78\x14\xc9\xa1\x25\x46\x03\x86\x23\x3a\x3d\x35\x8e\x51\x13\x03\x04\x1e\x7d\xb3\x9f\x58\x17\x6d\xa5\xfc\x54\x08\x75\x56\x8c\x31\x0f\x4c\xd3\x78\x64\xcf\x2e\x91\x05\x35\x13\xde\x26\x38\x5c\xed\x65\xb4\xe5\x24\xe0\x6e\x7a\xed\xe6\x39\xd9\x67\x58\xac\x0e\x7f\xd7\x13\x76\xf0\xd0\x78\xf9\x43\xd7\x91\x66\xa2\x1e\xe6\x5d\x13\x96\x02\xfa\xcb\xe5\x66\x6c\x86\x5e\x53\xb7\x3f\x68\xc0\x94\x16\xd2\xd6\x43\x6b\xdf\xac\x45\x5d\x0b\xb1\x1a\x12\x1f\x69\xb1\xdb\x8a\x13\xa3\x65\x9b\x23\xdc\x93\x27\x4b\xbe\x6b\x13\xcf\x0f\x23\x3a\xa9\xeb\xeb\x4b\xeb\xb2\xa7\x80\x37\xb2\xbe\xb8\x7d\x6d\xf3\xb1\x99\xa0\x0f\xb7\xb7\x6b\x89\x7f\x47\xc7\x1e\xee\x0a\xf2\x45\xd0\x2a\xe1\x51\x88\xba\x40\x1c\x8f\xb9\x45\xc9\xd9\xa8\x8e\x9e\xb7\xcc\x61\x57\x76\xac\x67\x8a\x08\xca\x26\x0c\x8e\x6b\xa0\x59\x89\x09\x57\xc1\x23\x35\xf1\x69\x81\x54\xba\xe9\x40\x09\xf0\x79\xf4\x42\xb2\x0f\xc8\xd9\xd3\x56\xe1\x96\x82\x48\x3d\xac\x9a\x55\xcd\x4b\x7b\x3c\x88\x33\x64\xa6\x13\x88\x63\x6e\x08\xbe\xeb\xee\x64\x6f\x26\xd1\x76\x24\x43\xc1\xbf\x88\x2e\x3f\xa0\xa1\x3c\xbc\xea\xa8\xa1\x3c\xde\xb8\xaa\x00\x73\x31\x71\x01\x81\xb5\x90\x29\xe1\x10\xeb\xf8\xb9\xa4\xca\x1e\xee\x67\x5a\xeb\x57\x37\x35\xee\x5c\x9d\x18\x75\x8f\x26\x5b\x39\xf3\xc2\x3d\xad\x3e\x55\xe3\xda\x76\xff\x5d\x97\x6c\x93\xb3\x59\x0b\xcb\x2d\xdf\xc0\x90\x6d\xa2\xd1\x62\x7b\x2d\x39\x1d\x44\x36\x1f\x11\x9d\xe6\xf9\x93\x29\xd5\x98\x64\xf7\x21\x65\xb0\x87\x87\x8d\xb6\x35\xdd\x5c\xe9\xdd\x6b\xa5\x67\x67\x99\x8a\x1d\x50\xf6\x57\xed\x02\x76\x6c\x57\x8f\x18\x37\x41\xfc\xde\x9f\x5f\x8d\x20\x4f\xeb\xff\x99\xf0\x95\x0d\x5f\xdd\x47\x52\x9c\xd9\xb5\x5c\xbc\xac\x3e\xd8\x11\xcb\x02\xf1\x7a\x75\xc9\x78\x20\xd3\x7b\xc5\x86\xcb\xed\x73\xb3\x82\x53\x71\xce\x68\xb1\xd9\x07\x38\x06\x54\x09\xc3\x6f\xee\x1b\x1b\x3c\x2e\x4b\x95\x1a\x25\x0e\x5d\x90\x05\x20\xf3\x30\x0c\x8c\xb3\xb5\x2b\xbe\xfc\x74\xb5\x0a\x79\xbb\xe5\xa4\x77\x65\xdb\x4e\x92\x5e\x9d\x30\xf2\xb8\x0c\xa0\x65\x59\x73\xf9\x51\xe8\xd2\xc2\x1c\x59\xdf\x83\x4f\x7d\xb3\x00\xa8\x0b\xca\xac\x2c\x24\xef\x6d\xbc\x80\xd7\x97\xeb\xe0\x0d\x58\xea\xdb\xdb\x85\xd0\x35\xf6\x4b\x18\x67\xbb\x67\xf1\x23\x3a\x4c\x95\x52\xd6\x81\xa2\xae\xd1\x7f\xc9\x65\xd0\x5c\xe2\xd9\xb4\x93\x17\x1f\x63\xda\x7c\x13\xbe\xc0\xb7\x30\x9f\x94\x50\x75\x12\x64\x19\xfd\xad\x6d\xe5\x94\xbc\x6e\xa7\x7d\xd2\x4f\xe2\x55\x17\x89\x7d\x29\x47\x1b\xc7\x44\x6e\xaa\xf5\xc7\xc6\xa9\x9d\x0f\x3b\x26\xa1\x0a\x78\xd4\x1c\xf2\xb0\x6b\x1d\x55\xf7\xe3\xaf\x7d\x9e\xab\xac\xa3\xf5\xa0\x69\x17\xb6\x9f\x55\x38\x0a\xcb\xbd\x83\x13\x06\x4e\xc6\x78\xf1\xf1\x2e\x60\xe9\x2d\x2d\x2f\xf7\x41\x36\x10\x1b\x2d\x5b\x8e\xd2\xc8\xf7\x20\x1f\xb0\x30\xac\x60\xe3\x3b\x46\x9a\x79\x03\x35\xaf\x4c\x76\x2f\xb8\x18\x0c\x8a\x5c\x52\xc4\xf0\x51\xb7\xd1\x28\x92\x2e\x3e\x11\xbf\xc8\x8f\x66\xf5\xba\x2c\x52\x2e\xbe\xba\x0a\x33\x9b\x39\x64\x3b\x7c\xf2\x04\x05\x32\x41\xed\xea\xce\x51\x4a\xae\xac\xec\x9a\x17\x77\x85\xd1\x46\x9a\x49\x72\xd1\x16\x9d\x4c\xda\x45\x6a\x47\xf5\xfb\x0a\xdf\xb6\x30\xd6\xf7\xcd\x6d\xdf\x53\x87\x65\x5c\xbb\x62\x8a\xf9\x7d\xa6\x2c\x0b\xc8\xab\xb4\x95\x9c\x96\xad\x4d\xbc\xaa\xd3\xfc\xd6\x43\x7d\x0b\x1e\x31\x8e\xde\xc5\xab\xfa\x60\xab\xcf\x7b\x8a\x2a\x72\x30\x02\x36\x5f\xe1\x0e\x5c\xf1\xdc\x09\xea\x24\xb8\x12\xe7\x42\xe9\x8b\x50\x8a\x97\x8a\x2c\xd2\x1e\x67\x69\x57\xee\xef\xda\xfb\x1f\x2f\xdd\xb0\xb1\xbe\x84\x4b\x9d\x14\xd9\x39\x8f\xcb\x76\xda\x64\x67\x14\x93\xd4\x6b\xde\x28\xa7\xee\xdb\x53\x57\xd4\x38\x8a\x1a\xff\x08\x00\x00\xff\xff\x81\x18\x4c\xd8\xb9\x20\x00\x00")
func complySoc2PoliciesApplicationMdBytes() ([]byte, error) {
return bindataRead(
@ -517,7 +517,7 @@ func complySoc2PoliciesApplicationMd() (*asset, error) {
return nil, err
}
info := bindataFileInfo{name: "comply-soc2/policies/application.md", size: 162, mode: os.FileMode(420), modTime: time.Unix(1526624477, 0)}
info := bindataFileInfo{name: "comply-soc2/policies/application.md", size: 8377, mode: os.FileMode(420), modTime: time.Unix(1526668702, 0)}
a := &asset{bytes: bytes, info: info}
return a, nil
}
@ -537,7 +537,7 @@ func complySoc2PoliciesAvailabilityMd() (*asset, error) {
return nil, err
}
info := bindataFileInfo{name: "comply-soc2/policies/availability.md", size: 164, mode: os.FileMode(420), modTime: time.Unix(1526624477, 0)}
info := bindataFileInfo{name: "comply-soc2/policies/availability.md", size: 164, mode: os.FileMode(420), modTime: time.Unix(1526668702, 0)}
a := &asset{bytes: bytes, info: info}
return a, nil
}
@ -557,7 +557,7 @@ func complySoc2PoliciesChangeMd() (*asset, error) {
return nil, err
}
info := bindataFileInfo{name: "comply-soc2/policies/change.md", size: 2793, mode: os.FileMode(420), modTime: time.Unix(1526624477, 0)}
info := bindataFileInfo{name: "comply-soc2/policies/change.md", size: 2793, mode: os.FileMode(420), modTime: time.Unix(1526668702, 0)}
a := &asset{bytes: bytes, info: info}
return a, nil
}
@ -577,7 +577,7 @@ func complySoc2PoliciesClassificationMd() (*asset, error) {
return nil, err
}
info := bindataFileInfo{name: "comply-soc2/policies/classification.md", size: 161, mode: os.FileMode(420), modTime: time.Unix(1526624477, 0)}
info := bindataFileInfo{name: "comply-soc2/policies/classification.md", size: 161, mode: os.FileMode(420), modTime: time.Unix(1526668702, 0)}
a := &asset{bytes: bytes, info: info}
return a, nil
}
@ -597,7 +597,7 @@ func complySoc2PoliciesConductMd() (*asset, error) {
return nil, err
}
info := bindataFileInfo{name: "comply-soc2/policies/conduct.md", size: 4492, mode: os.FileMode(420), modTime: time.Unix(1526624477, 0)}
info := bindataFileInfo{name: "comply-soc2/policies/conduct.md", size: 4492, mode: os.FileMode(420), modTime: time.Unix(1526668702, 0)}
a := &asset{bytes: bytes, info: info}
return a, nil
}
@ -617,7 +617,7 @@ func complySoc2PoliciesConfidentialityMd() (*asset, error) {
return nil, err
}
info := bindataFileInfo{name: "comply-soc2/policies/confidentiality.md", size: 3653, mode: os.FileMode(420), modTime: time.Unix(1526624477, 0)}
info := bindataFileInfo{name: "comply-soc2/policies/confidentiality.md", size: 3653, mode: os.FileMode(420), modTime: time.Unix(1526668702, 0)}
a := &asset{bytes: bytes, info: info}
return a, nil
}
@ -637,12 +637,12 @@ func complySoc2PoliciesContinuityMd() (*asset, error) {
return nil, err
}
info := bindataFileInfo{name: "comply-soc2/policies/continuity.md", size: 5043, mode: os.FileMode(420), modTime: time.Unix(1526624477, 0)}
info := bindataFileInfo{name: "comply-soc2/policies/continuity.md", size: 5043, mode: os.FileMode(420), modTime: time.Unix(1526668702, 0)}
a := &asset{bytes: bytes, info: info}
return a, nil
}
var _complySoc2PoliciesCyberMd = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x1c\x8d\x31\x8a\xc3\x30\x10\x45\xfb\x39\xc5\x87\xad\xb5\xac\xb7\xda\x55\x17\x54\x25\x95\xb1\x73\x01\x45\x9e\x84\x49\xac\x19\xf0\xc8\x01\xdf\x3e\xd8\xd5\x87\xcf\x7b\x3c\xcd\x95\x23\xd2\x76\xe3\x05\x83\xf8\x0b\x27\x77\x76\xaf\xac\x0d\xbd\xcd\x52\x36\xca\x65\x31\xdd\x6a\x44\x1a\x7a\xf2\xdc\xc4\xef\xc2\x1e\x09\xb8\x8e\x69\x1f\x20\x20\xa5\xff\xef\x8e\x6a\x7e\xda\x32\xf0\x5b\x5c\x4c\x0f\x24\x60\xca\x8d\x23\x2e\xab\xa2\xc3\xef\x4f\xf7\x77\x08\xc5\xea\x9e\x88\x38\xab\x34\xc9\x33\x26\x2b\xeb\xfe\x50\x08\x81\xe8\x0b\xc9\xaa\xe8\x03\xa3\x99\x7e\x02\x00\x00\xff\xff\x69\x84\x0b\x8f\xa3\x00\x00\x00")
var _complySoc2PoliciesCyberMd = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xbc\x58\xcd\x6e\x23\xb9\x11\xbe\xeb\x29\x0a\xc8\x65\x07\x90\xb5\x33\x93\x1c\x12\xdf\xbc\x4e\x16\xd8\x5c\x32\xf0\x1a\xc8\x61\x30\x07\x8a\xac\x56\x57\xcc\x66\xf5\x14\x49\x69\x94\x53\x5e\x23\xaf\x97\x27\x09\x8a\x64\xff\x48\x96\x07\x49\x0e\x39\x19\x6e\x92\xc5\xfa\xf9\xea\xfb\x8a\x0a\x66\xc0\x7b\x78\x3c\xef\x51\xe0\x89\xe2\x0b\x3c\xc4\x88\x31\x0e\x18\x12\x7c\x62\x4f\xf6\xbc\x31\x56\x38\x9c\x87\x7b\x78\x7c\xfa\xb4\x89\x26\x51\xec\x08\xe3\xfd\x06\xe0\xf9\xd7\x47\xfd\x03\x70\x07\x8f\x8f\x7f\xd8\x7d\xd8\x0c\xe6\x6f\x2c\x4f\x78\xa4\x48\x1c\xca\x96\x3b\x70\x26\xe1\x3d\xfc\x39\x07\xf8\x00\x1f\xdf\x7f\xf8\x7d\x39\x60\x79\xd0\x2b\xee\xe1\x97\x40\x89\x8c\x07\xc7\x36\xeb\x97\xcd\xdd\xdd\xdd\x66\xf3\x1b\xf8\x94\x65\xe4\x88\x60\x82\x83\x5f\x2d\x8f\xb8\xd9\x98\x1d\x3c\xf7\x08\x63\x5b\xe1\x0e\x52\x4f\x11\xc6\xe2\x25\x50\x84\xc4\xe0\xb0\xa3\x80\x90\x74\x9f\xb0\x45\x97\x05\xcb\x82\x29\x61\x15\x73\x49\xd0\x24\xa0\xd0\xb1\x0c\x26\x11\x07\x88\x68\xb3\x50\x3a\x83\x50\x7c\x89\x70\xa2\xd4\x53\x28\x46\x58\x0e\x26\xd0\xdf\xcb\xb6\x6d\x3d\x7d\x71\x89\xb1\x16\xc7\x64\xf6\x1e\xc1\xe3\x11\xbd\x7a\xa5\x46\x80\x8f\x28\xc6\xfb\x5d\x71\xbb\x24\xd6\x2c\x89\x55\x3b\x65\x57\x71\xa5\x7e\x12\x04\x33\x8e\x9e\xb0\x5c\xa1\xb6\x31\x24\x12\x84\xa8\xd1\xd7\x68\x2f\xfd\xf9\xd7\x3f\xfe\x19\x6f\x87\x31\x0a\x1f\xc4\x0c\xb3\xc3\xc6\xfb\xcb\x8d\xe7\x98\x70\x88\x70\xea\xc9\xf6\xe5\xea\x1c\xd1\xbd\x15\x37\xb0\xb4\x9d\x96\xb3\x77\xd0\x9b\xa3\xd6\x05\x68\x18\x8d\x4d\xc0\xaf\x4f\xbc\xe9\xd9\xae\x55\x71\x29\x5b\x8d\x39\x4e\x5e\x0e\x26\x98\x03\xce\x49\xc2\x61\xf4\x7c\x46\x5d\xef\x4d\x82\x64\x5e\x10\x46\x23\x5a\xbd\xdb\x97\xca\x65\xa6\xe3\xe5\x65\x43\x8e\x09\xf6\x08\x83\x71\x08\x82\xc6\x91\x3f\x83\x39\x1a\xf2\xa5\x82\xcd\x87\x53\xcf\x03\x50\x5a\xb9\xb6\x53\x44\xfe\x64\xec\xcb\x41\x38\x07\xf7\x2a\x88\x0a\x88\x08\x06\x62\xc2\xf1\x6e\x7f\xbe\xd3\xbf\x15\x81\x31\x42\xc7\x02\x96\x83\xcb\x36\x51\x38\xbc\xf2\x71\x0b\x26\xc2\x09\xbd\xd7\xbf\x5a\xfb\x8a\x4f\xa7\xf5\xef\x14\x0f\x15\x95\x9d\xf0\x50\xd2\x7e\xb3\xe2\x28\x71\x44\x9b\xe8\x88\x57\xf9\xf5\x51\x01\x1b\xad\xd0\x1e\x23\xf4\x7c\xd2\x2b\x46\xc1\x51\xcb\xae\x39\xbc\xee\xfa\x27\x1c\x59\x12\x08\x7e\xcd\x24\xe8\xd4\xa9\x92\xf2\x86\xc0\x2b\xef\xa7\x20\x6b\x65\xff\xda\x63\x58\x87\x6a\xae\xb7\x6f\x5f\xa3\xab\x14\xa5\x45\x7b\x2e\x05\x58\x2f\x9b\xdb\xc8\xdd\xc1\x2f\xa9\x9e\x4c\x7a\xe5\xc5\xf1\xd4\x6b\x02\x6b\xaf\x1f\xb3\x0f\x28\x66\x4f\x9e\x92\xd6\xb2\x37\x47\xf5\x4b\x9b\x98\x0b\xde\x21\x66\xdb\xcf\x66\x6b\xc7\x88\x49\x35\x35\x11\x8f\x58\xd2\xcb\x5d\xdd\xf7\x3d\xd3\xc6\x5a\x16\xd7\xac\x1b\x4d\x71\x85\x45\xb1\xa7\x9f\xa3\x35\x1e\x77\x25\xd5\x2b\x0a\xe0\x53\x40\x89\x33\x34\xa7\x33\x8a\x19\x34\xb6\xaf\x9b\x28\xe1\x50\x33\xfc\x97\x60\xf1\x66\x1d\x28\x2a\xa9\x8e\x1e\x13\xba\x1b\x59\x8e\xbd\xa6\xc6\x61\x42\x19\x94\xbc\x1a\x10\x6a\xbf\x4d\xbc\xd7\x63\xc3\x44\x63\xaf\x66\xbf\x41\x70\x8a\x83\x22\x38\xc4\xa1\x42\x23\x31\x43\x4f\x87\xbe\xa1\x6e\xd5\xbf\x14\xe1\x25\xf0\x29\xe8\xae\x4b\xb2\x6b\x84\xb8\x90\x1f\x8f\xea\xa3\x52\x86\xf5\xd9\x21\xec\x73\x25\xc4\xc0\x09\x3c\x0d\x94\x2a\x29\x6a\x43\x9e\x4b\x26\x27\xd8\x5b\x0e\x49\xd8\xc7\x2d\x70\x4e\x91\xb3\xd8\xa9\xc1\xb6\x8d\x9a\x97\xff\x59\xc0\x51\xd4\x13\x14\x72\x29\x53\xe1\xef\x44\x47\xb5\x64\x62\x64\x4b\x26\x35\x1a\x9c\x53\x5c\xb3\xfe\x00\x23\x06\x4c\x52\x73\x99\x30\xa6\xb9\x60\x23\x8a\xc2\x13\x1d\xec\xcf\x60\x54\x92\xc4\x95\x86\x39\xab\xcb\x8a\x9f\xee\x3c\x49\x45\x16\x63\xcf\x6f\x35\x52\xe1\xbb\xae\xab\x4d\x1c\x94\x37\xb8\x03\x87\x85\x00\xaf\xe5\x22\x16\x46\xfa\x34\x29\x1c\x3c\x33\xfc\xe9\x1b\xda\x9c\xde\x6a\xe7\x12\xc5\x23\x87\x8e\x64\x98\xc8\x74\x91\x98\x5b\xae\x5c\xe9\xd3\xc4\x65\xbd\x89\xb0\x47\xed\x72\x23\xa2\xe4\xc4\x5a\xab\x35\xf4\x6f\x71\x4a\x9d\x24\x76\xb7\x35\xfc\xf5\xfd\xa7\x4a\x84\x17\x5d\x7d\x8b\x05\xf4\x30\xc9\x75\x27\x36\xd9\x6b\xad\x5a\x62\xad\xc2\x85\xdf\x46\xcf\x94\xae\xf7\x17\x97\x62\x11\x16\x33\x68\x83\x28\x1b\x0b\x42\x97\x25\xf5\x28\x80\x47\xe3\x73\x41\x06\xa9\x16\x3a\x14\x75\x0e\xa3\xca\x3e\xc5\x0a\x15\x2b\x94\xc8\x1a\xdf\xc8\x82\x82\xa3\x23\xb9\x6c\x7c\x6d\xad\xef\x47\xbe\x64\xb9\x05\xbe\x1a\x30\x6a\xa8\x26\x91\x85\x01\x4d\x28\xa0\x10\x74\xb9\x00\xbd\xea\x8a\x76\x80\x9f\x00\x5d\x3b\x79\x25\x1e\x4d\x29\xaf\x52\xdc\x60\xed\xfd\xcd\xda\xaf\xc6\x92\xda\x1f\xca\x6f\x25\x27\x33\xc5\xac\x87\x85\xff\x7d\x42\x59\xf2\x72\x0b\x02\xa4\x77\xe9\x7f\x4b\x18\x23\x0a\xb1\xab\x5a\xf8\xd9\x99\xf3\x8f\x03\x87\xd4\xff\x78\x46\x23\x5f\x34\x73\xd7\xdf\x56\xc6\x2f\xb3\xbc\xb6\xfd\x5f\x58\xfb\x99\x54\x91\xa4\xf4\x54\x4b\x49\xd3\x52\x07\x2e\x8b\x56\xe1\xb3\x0a\xb1\xa2\xb6\xfa\xfa\xe5\xed\x18\xbf\xd3\x66\xea\x62\xe5\xd2\xc2\x2b\x9f\x55\xdf\x39\x80\x60\x1c\x39\x44\xd2\x69\x45\x15\xa2\x6c\x59\x97\xfe\x86\x32\x7f\xa9\x84\x86\xdf\x46\x94\xa4\xeb\x14\x93\x51\x15\x19\x85\x8f\xe4\x2e\x2f\x28\x88\x1a\x46\x13\xce\xaf\xee\x5a\x4e\xb6\x90\xfe\x58\xe3\xbd\x71\xf5\xf6\xa2\xe8\x1a\x8b\x65\xef\xd1\x16\x1e\xef\x85\xf3\xa1\x87\xaf\x19\xa3\x2e\x07\x43\x3a\xa2\x6b\x2e\x28\x24\x94\x23\xe1\xa9\x8e\xe0\x17\x1e\x54\xff\xe2\x16\xf4\xc1\xe2\x1b\xa3\x16\x25\x6d\x02\xaa\xaf\x14\xe5\xcc\xcb\xd9\x21\x07\x4a\xeb\xee\x5b\xa5\xb7\x8d\x29\x55\xc6\x3a\xf6\x9e\x4f\xf1\x7e\x53\x5e\x27\x54\x5b\xe3\x16\xe5\x54\x6a\x51\xd6\x69\xf7\x16\x0c\x2c\xfd\xb6\x9b\x2d\x3c\x37\x02\xba\xda\xb0\x28\x7b\x71\xbf\x92\x95\x65\xa9\xc1\x16\x12\xbd\x9e\x2c\xde\xb4\x50\x39\x6e\x37\xdd\xf8\xb4\x9a\x27\xde\x3c\xd3\x44\xad\x1d\x79\xe4\x10\xf1\x6b\xc6\x60\x31\x4e\x1d\xec\xb9\x6a\x8f\x55\xb9\x28\x16\x0a\xaf\x6d\x4b\x7d\x0e\xa5\x7d\xd5\xe7\x36\x37\x53\xe1\xbc\x72\xdd\x42\x94\x39\xd6\xe9\x2f\x5a\x56\x22\xd5\xfe\x7a\xaf\x0d\xf5\x71\x5b\x2b\xfb\x1e\xf6\x38\x61\xc7\xf3\x49\xf5\xb4\x0d\x17\x6a\xf9\xe3\x6a\x55\x67\x8b\x65\x79\x9d\x5d\x04\x4f\x2f\xe8\xa9\x67\x76\xcb\xb3\x4b\x45\x56\x34\x1c\xf8\x81\x76\xb8\x5b\xa4\xae\xe6\x0a\x4e\xe4\xfd\x2c\x04\xfa\x7d\x9d\xec\xf3\xbb\x82\x8c\xff\x7b\x1c\x17\x2f\xc7\x82\x4d\xe3\x6d\xf6\xc5\x05\x9d\x2a\x5c\x81\x45\x1e\xab\xd4\x2c\x25\x2b\xb7\x2c\x59\x58\xac\x3e\xcd\xef\xd8\xd9\x79\xee\xe0\xb7\xda\xde\xbf\xab\xb5\x9a\x27\xc1\x32\x59\xed\x11\x72\x58\xbd\x65\x27\xd1\x6a\xe6\x7e\x9e\xc0\xf3\x6a\xd3\x76\x1a\xf1\xaf\x87\xb9\xa9\xc5\x22\x39\x14\x9d\x48\x0b\x64\xc6\x51\x78\x14\x1d\xb3\x6e\xcb\xc2\x34\xcf\x55\x1f\x23\x56\xce\x58\x1c\x79\xe8\x12\xca\xd5\xae\xf6\x6a\xde\x2a\x5d\xac\x24\xb7\x2d\xb6\x01\x76\xa1\x80\xda\xe9\x9a\xcf\xe9\x27\x87\xb6\xb5\x3c\x81\x59\xe0\x80\x8a\x87\xb4\x10\xba\x26\x7d\x96\x8b\xf6\x22\xee\xfe\x03\x32\xaf\x3f\x8d\x5c\x34\xe7\x6a\x24\x7a\x2e\x39\xfc\xe1\x61\x1c\x31\x38\xfa\x06\x0f\xef\xee\x97\x26\xb5\x3c\xec\x29\xcc\x77\x2d\xcf\x93\x57\x8f\x8e\x65\xd2\xd9\xd6\x9f\x43\x6a\x6d\x62\xcf\xa7\x58\xf1\x6d\x7c\xc6\xf9\x0d\xfa\x06\x72\x1a\x0b\x4d\xa8\x8b\xeb\xf1\x77\xed\xff\xf3\x5c\xe5\x6b\xf7\x7f\x7a\x77\x3f\x3f\x83\xcb\x18\xd0\x46\x7a\xbd\xf7\x32\x2d\xdb\x56\xd7\x16\xdb\x5c\xcc\xee\x7b\x20\xab\xac\xbb\xea\x94\x75\xad\x77\xff\x0e\x00\x00\xff\xff\xf5\x1c\xb7\x64\xc5\x12\x00\x00")
func complySoc2PoliciesCyberMdBytes() ([]byte, error) {
return bindataRead(
@ -657,7 +657,7 @@ func complySoc2PoliciesCyberMd() (*asset, error) {
return nil, err
}
info := bindataFileInfo{name: "comply-soc2/policies/cyber.md", size: 163, mode: os.FileMode(420), modTime: time.Unix(1526624477, 0)}
info := bindataFileInfo{name: "comply-soc2/policies/cyber.md", size: 4805, mode: os.FileMode(420), modTime: time.Unix(1526668702, 0)}
a := &asset{bytes: bytes, info: info}
return a, nil
}
@ -677,7 +677,7 @@ func complySoc2PoliciesDatacenterMd() (*asset, error) {
return nil, err
}
info := bindataFileInfo{name: "comply-soc2/policies/datacenter.md", size: 3014, mode: os.FileMode(420), modTime: time.Unix(1526624477, 0)}
info := bindataFileInfo{name: "comply-soc2/policies/datacenter.md", size: 3014, mode: os.FileMode(420), modTime: time.Unix(1526668702, 0)}
a := &asset{bytes: bytes, info: info}
return a, nil
}
@ -697,12 +697,12 @@ func complySoc2PoliciesDevelopmentMd() (*asset, error) {
return nil, err
}
info := bindataFileInfo{name: "comply-soc2/policies/development.md", size: 174, mode: os.FileMode(420), modTime: time.Unix(1526624477, 0)}
info := bindataFileInfo{name: "comply-soc2/policies/development.md", size: 174, mode: os.FileMode(420), modTime: time.Unix(1526668702, 0)}
a := &asset{bytes: bytes, info: info}
return a, nil
}
var _complySoc2PoliciesDisasterMd = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x44\xca\x31\x8a\xc3\x30\x10\x85\xe1\x5e\xa7\x78\xb0\xb5\x96\xb5\xb7\x09\xea\x82\xdd\x24\x95\xb1\x73\x81\x41\x9e\x84\x09\xd6\x0c\x48\xb2\xc1\xb7\x0f\x76\x93\xea\x3d\x7e\x3e\xa5\xc4\x01\xbd\x14\x2a\x95\x33\x46\x8e\xb6\x71\xde\x31\xd8\x22\x71\x77\x14\xb3\xe9\x9e\x02\xfa\x71\x70\x85\xaa\x94\xa7\x70\x09\x0e\x78\x4c\xdd\x31\x80\xc7\xb5\xf9\x6d\xbf\xf7\xdf\x25\x7a\x5b\x1e\x79\x93\x22\xa6\x27\xf6\x98\xa9\x72\xc0\x7d\x55\x34\x68\xff\x9a\xcb\xe9\xa3\xa5\xc4\x5a\x03\x6e\x2a\x55\x68\xc1\x6c\x71\x3d\x8a\xf3\xde\x3b\xf7\x83\xce\x92\xe8\x0b\x93\x99\x7e\x02\x00\x00\xff\xff\x9a\x7d\xe7\x10\xa9\x00\x00\x00")
var _complySoc2PoliciesDisasterMd = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xec\x5a\xcd\x6e\x1c\xb9\xf1\xbf\xcf\x53\x14\xb0\xc0\x1f\x92\x77\x34\xfa\x7b\x73\x09\x14\xe4\x20\xdb\x8b\x44\x9b\x85\x2d\x48\x02\xf6\xa0\xe8\x50\x4d\x56\x4f\xd3\x62\x93\x1d\x92\x3d\xe3\x31\x7c\xc8\x6b\xe4\xf5\xf2\x24\x41\x91\xdd\xec\xee\xf9\xb0\xe4\x18\x63\x60\x03\xcf\xc5\x23\x0e\x9b\xf5\xf5\xab\x5f\x55\xb1\x6d\xb0\xa6\x0b\x78\xa3\x3c\xfa\x40\x0e\x6e\x48\xd8\x15\xb9\x0d\x5c\x5b\xad\xc4\x66\x86\xc2\x59\xb3\xa9\x2f\xe0\xcd\xcd\xf5\xcc\x63\x50\xbe\x54\xe4\x2f\x66\x00\x77\xb7\xaf\xf9\x1f\x80\x33\xb8\x7c\xb9\xf8\x69\xf8\xfa\x87\x59\x8d\xef\xad\xbb\xa1\x95\xf2\xca\x9a\xb8\xf9\x0c\x24\x06\xba\x80\x5f\x5a\x03\x2f\xe1\xa7\xff\x7f\xf9\xc7\xb8\x5f\xd8\xba\x26\x13\x2e\xe0\xca\xa8\xa0\x50\x83\xb4\xa2\xe5\x95\xd9\xd9\xd9\xd9\xec\x87\xeb\xd6\x35\xd6\x13\xa0\x91\x70\x2b\x6c\x43\x30\x9b\xe1\x02\xee\x2a\x82\xa6\xfb\xc9\x96\x10\x2a\xe5\xa1\x89\xea\x82\xf2\x10\x2c\x48\x2a\x95\x21\x08\x15\x81\x75\x4b\x34\xea\x23\x06\x65\xcd\xbf\xff\xf9\x2f\x0f\x8d\xb3\x82\x64\xeb\x28\xee\x74\xc9\x5c\xb8\x32\xa5\x75\x75\xdc\x05\x77\x24\x2a\x63\xb5\x5d\x6e\xe0\xe4\xea\xee\x14\x94\x29\x1d\xfa\xe0\x5a\x11\x5a\x97\x94\xb9\xba\x03\x4f\x6e\xa5\x04\x79\x58\xab\x50\x29\x03\x9e\x02\x48\x42\xa9\x95\x21\x0f\xca\x44\xe9\x02\x93\x8a\x08\xb2\x77\xb0\x75\x60\x43\x45\x8e\x57\x5c\xdb\x04\xb5\x22\x50\x46\x28\x49\x26\x24\xd3\x6c\xf1\x9e\x44\x5c\xcf\xc6\x69\x34\x9d\x69\xc2\xd6\x8d\xa6\x90\x8c\x73\x7d\xb0\x6c\xc9\x2a\x3d\x4f\x51\x8c\xaa\xe6\x38\xdf\xa9\x9a\xe0\x5d\x16\x79\x72\x73\xf7\xee\x74\xd1\xb9\x79\xe4\x57\x23\x74\x2b\xc9\x03\x6a\x0d\x8e\xbc\x6d\x1d\x1f\xc9\x22\xa2\x43\xbd\x27\x0f\x86\xf8\x0b\xba\x0d\x94\xd6\xf5\x72\xe3\x1e\x89\x01\xb3\xb6\xf3\xb8\x14\xbf\xa7\xf3\xd4\xc8\xf9\x9e\x44\xeb\x54\xd8\x00\xfa\x86\x44\xf0\x6c\x5a\xd1\x7a\x76\xaa\x07\x61\x4d\x50\xa6\xe5\x9f\x6b\x34\xb8\x24\x86\xca\xae\xb2\xd8\x34\x5a\xa5\xf8\xf2\xf1\xc3\xd6\x39\x50\xdd\x68\xbb\xa1\x4e\x75\xdf\xc6\x9d\xce\x43\xa8\x30\x00\x3a\x0e\xc5\xca\xea\x15\xc9\x3e\x82\x4f\xbb\x78\xdb\xbf\xdb\xa8\x9b\xea\x56\xb7\x3e\x40\x41\x50\xa3\xe4\xc3\x51\x2a\xbd\x01\x5c\xa1\xd2\x58\x68\xea\x55\x5e\x57\xb6\x06\x15\x46\x96\x2c\x66\xb3\x1f\xe0\x15\x8a\xc7\xa5\xb3\xad\x91\x3b\x36\x27\xc8\xfb\x24\x7d\x45\x8e\x4f\xc9\x98\xcb\x46\xf8\xe0\x30\xd0\x32\x05\x68\x9f\xa2\x34\x6c\x91\xe4\x85\x53\x45\x7f\xe6\x76\x1e\x7d\x16\x40\x73\x58\x57\x4a\x54\x8c\xd9\xa4\x98\x04\x4c\xe7\xc8\xd6\xa5\x40\x33\xb6\xf9\xc9\x91\x0b\x41\xd3\x8a\x74\xd4\x4d\x38\x15\x94\x40\x3d\xc4\x7e\x80\x59\xb0\xec\x40\x47\x3e\x58\xc7\x07\x97\x6c\xe2\x13\x19\x46\xab\x18\x7e\xf4\xb0\x26\xad\x7b\x65\x06\x2e\x98\xf3\x79\x8d\x35\x5e\x15\x4a\x47\xf8\x19\x09\x81\x89\x20\x6a\xb1\x6c\x95\x44\x23\x58\xea\x3f\x5a\xc5\x52\x83\x85\x9a\x28\xc4\x63\x6e\xee\xde\x6d\x01\x50\x7b\x0b\x5a\xf9\x90\xc4\x30\x6c\x51\x84\x09\xce\xd9\xc8\x86\x9c\xb7\xc6\x90\x9e\x38\xa1\x71\x76\xa5\x64\x06\x65\x8d\x1b\x36\xd7\x10\x49\x92\xec\x3e\x65\x96\x63\x6b\x73\x6c\xa3\x89\x8b\x4c\x90\xa5\xd5\xda\xae\x79\xb3\xb0\x46\x2a\x16\xea\x07\xf4\x51\xe8\x20\xd0\xb3\x4b\x72\xea\x4a\x31\x0a\x2f\x66\x91\x9c\xd5\x02\x2e\xb5\x06\xb6\xb8\x49\xd9\xe3\x6d\x19\xd6\xe8\x46\x39\x7d\x92\x70\xa4\x1c\x14\x28\x1e\xdb\xc6\x9f\x97\xa8\x74\x4c\xed\xd3\x98\x4f\x03\xb4\x99\x23\x6d\xcd\xc8\x37\x86\xdc\x22\xcb\xb8\x2a\x81\xd9\xad\xa3\x40\x08\xf8\x48\x51\x27\xa6\x8e\x70\x80\xc3\xab\x8d\x8f\x71\xd1\x56\xc4\xd5\xf9\x16\x2f\x8d\xb3\x78\x70\x50\x59\x5a\x17\x7c\x52\xab\x4b\xb6\x82\x20\x38\x34\xbe\x24\xd7\x45\x15\x0d\xa0\x0e\xe4\x0c\x06\x82\xb5\x75\x8f\xe0\x55\x20\x38\xf1\xad\xa8\x3a\xdc\x28\x07\x15\x5b\x62\xcb\x52\x09\x3a\xdd\xa6\x65\xe5\x40\xb6\x41\x91\x1f\x6c\xe4\x80\x8c\x4b\xcc\x6d\xcf\x72\xef\xe2\x11\x8e\x13\x25\x03\x50\x53\x4a\x01\x6b\x9d\x54\x06\x43\x0c\x78\x64\x4c\x23\x5b\x91\xfe\x84\x42\x9d\xa1\x31\x2d\x6a\x38\xc1\x00\x9a\xd0\x87\x53\x70\x54\x11\x3a\x8f\x3a\x57\x8e\x11\x63\x72\x98\x17\x30\x22\x0e\x0e\xbb\xb4\xcc\xdb\x36\x24\x3a\x8e\xde\x1e\x80\x13\x36\x0d\x45\x02\xee\x83\xe3\x07\x64\x5c\xf5\x4b\x1d\x75\x96\x25\x89\x00\xa2\xf5\xc1\xd6\x8c\x5d\x86\x37\xba\x60\xf8\x7b\xd1\x06\xa8\x70\x45\x60\x2c\x07\x81\x37\xda\x5d\x9e\x8c\x91\xf5\x1b\x1f\xa8\xf6\x7f\x4a\xf4\xcb\x06\xa0\xa7\x79\xca\xa2\xee\xec\x04\xe2\x44\xe4\x9d\xbb\xed\xda\x4c\x2c\x1d\x53\x45\x8d\x8f\x04\x9e\xc9\x3a\x2a\x1a\x2a\xda\x80\xc0\xbc\x3f\xa2\x40\x99\x40\x8e\x33\x94\x29\x7c\x47\xb1\xe8\x7c\x15\xb2\x72\x8b\xa7\x9c\xa0\x6d\x2b\xb7\x2b\xc5\x50\x6a\x3a\x50\x0b\x1b\xab\xcd\x64\x53\xe4\xbf\x79\x57\x6c\x39\x02\xec\x39\x8e\x8e\x56\xb5\x0a\x09\x9f\x7f\xb1\x76\xa9\x69\x0e\x7f\x25\x67\x1f\xdb\x54\x4b\x2f\x6b\xfc\x68\x0d\xfc\x46\x05\xdc\x76\xd5\xa8\x6b\x25\xc6\x66\x48\x6a\xc8\x48\xcf\xbe\x8f\x60\x1e\x55\x3f\xfb\x3c\x7f\xc6\x22\xd4\x35\x86\x8c\xa3\x17\x37\xd4\x67\xe0\x8b\x71\x3e\x1f\x68\xbc\x54\xcd\xbd\xc1\x90\x53\xca\x43\x6b\x32\x41\xcc\x0f\xa5\x9e\xaf\x38\xb9\x0b\x82\xd6\x93\x84\x22\x56\x26\xb5\xe4\x4d\x72\xa0\xd0\x5d\x7b\xa3\xd0\x7d\xe7\x29\x9f\x78\x83\x6b\x47\x80\x7b\xe6\xe9\xa8\x31\x4a\xe9\xb8\xd2\xd8\x64\xc0\xbe\x47\x7b\x08\x4d\x1d\xbb\x56\x5a\xb3\x72\x0f\xd3\x84\x1f\xe8\x7d\x5c\x35\x1c\x35\xd6\x05\xfe\x76\x48\xc8\x2e\xc7\xe7\xee\x6b\x50\x76\x38\x3c\xa8\xa0\x69\x97\x3e\x92\x9c\x98\xc6\x07\x45\x3d\xa4\x72\xf1\xe2\x75\x5f\x6d\x7b\xf4\xcc\xe1\x6f\xb4\x81\x3b\xf4\x8f\xb1\x51\x9a\xf7\x3f\xc0\xaf\xb1\x42\x5f\x2e\x1d\xc5\x86\xca\xc3\xc9\xed\xaf\x97\xfe\xf4\xc5\xc4\xf0\x81\x41\x72\x6f\x94\xcb\x29\xf7\xd5\xdc\xd1\x30\x09\x0b\xd6\x57\x52\xe7\x98\x82\x86\xaa\xcf\x06\xe4\xca\x6f\x1b\x4a\x3d\x83\x4f\x68\x8f\xf9\xaf\xea\x9a\xa4\xc2\x40\x7a\x33\xe9\x06\x4e\x94\x61\xa4\xd9\xc8\xae\xd6\x49\x72\xa7\x3c\x7f\x44\xf5\xf8\xf3\x72\x31\x72\x62\x96\x77\x58\xcf\x54\x83\x59\xa2\xa3\x1a\xb9\x9c\xb4\xc6\xb0\x69\x3b\x51\x7a\x38\xe0\x83\x47\xda\x40\xe8\x3d\x09\xec\xae\x5c\x86\x47\x0e\x78\xaa\xb0\x33\x2b\x00\x0a\x61\x5d\x6a\x44\xf6\x32\x55\x84\x7c\x1e\x1f\xd8\x5d\x39\x50\xc9\x75\x9a\x96\xa8\xe7\x31\xb7\x99\xef\xb8\x7c\x44\xa8\x2c\x5b\x8d\xc1\x72\x97\x5b\x68\xb5\x4c\xce\xee\xb8\x7e\xe2\x34\x5b\x8e\xcc\x39\x4f\xc6\x0c\x1e\x2a\x08\x1e\xa9\x09\x43\xc0\x58\x56\x54\x94\xc1\xd9\xf5\x87\x79\x46\x7a\xc8\xad\xca\x97\xf5\x96\x9c\xbf\xf7\xbe\x6b\xbd\x6a\xfc\xa0\xea\xb6\x06\xac\x6d\x6b\x42\x6e\x2a\x0b\x2a\x99\x5e\x73\x7c\x87\x8a\xd0\x2b\xda\x03\x66\x9e\xf8\x3f\xe6\x17\xb8\x4c\x67\xd1\x5b\x4b\x0a\x31\x81\x76\x60\x72\x3e\x81\x08\x77\x3e\x60\x0d\x1b\xf5\xb0\x80\x9b\xe9\x19\x49\x4e\x6e\x79\x9f\x81\xb8\x01\x1c\xa9\xa5\x90\xc3\x60\xc1\x23\x20\x9b\xd7\x90\x53\x56\x76\xc9\xfb\xd6\x06\x55\x2a\x91\x45\x5c\x73\x5d\x4f\xf3\xf4\x94\x98\xa7\xb0\x1c\x08\xa4\x17\x68\xe2\x41\x2c\xaf\x22\x33\x1d\x3c\x55\x3a\x8e\x64\x06\x45\x86\x04\x73\xf3\x70\xd6\xc9\x50\xbb\x12\x2f\x9d\x4e\xf1\x91\x65\xd8\xb2\x3b\x3c\x2b\x0a\x43\x02\xdd\xa7\x03\x77\x38\xcd\x8c\x4c\xf5\xe3\x3a\x19\x65\x3d\xec\xeb\xa2\xe2\x23\x9b\xb8\x67\xc2\x9a\xac\x3b\x17\x80\xc2\xae\xa8\x73\x64\x74\xdc\x1b\x42\xc6\xda\x8e\xeb\x7a\x67\x44\x43\xac\x49\xac\x23\xfb\xcd\xa9\x2e\xf5\x6a\xe7\xd6\x3e\xcd\x84\x80\x6d\xa8\x12\x21\xc5\xbb\x89\xfe\x99\xa4\x91\x46\x33\xb6\xe4\xbd\x2d\x3a\x6b\xc6\x6d\x46\x62\xb2\xbd\x2d\xfb\x48\x87\xbe\x0b\x1e\x00\xc8\xbf\xa8\xa0\x3a\x98\x6d\x83\x0f\xce\x07\xe4\xf5\x49\xcd\x2d\xae\xa4\x80\x4a\xf7\xde\xc9\xb1\x2b\x5b\xad\x37\x23\x58\xa2\x91\xe7\x91\x3d\x52\x26\xed\xad\xfc\x1c\x12\x1f\xb8\x3e\x76\xa4\x60\x96\x91\xc8\x0c\xa8\xba\xc1\x58\x13\xbd\x20\x83\x4e\xd9\x79\xf6\x47\x9c\x79\xd2\x53\x3d\xa5\x60\x22\x80\xae\xfa\x4a\xe5\x85\xa3\x1e\xf0\xc7\x72\xfb\x57\xe4\xcb\x28\x28\xfb\x68\xf4\x2b\x73\x66\x40\xe8\x7e\x0e\xed\x3a\x64\x23\x09\x57\x8c\x18\xdb\xc7\x28\x76\xb1\x86\xa7\x10\xdd\xcd\xda\xe3\xdb\x95\xa1\xce\x32\x08\xbc\x65\x00\xf1\x48\xeb\x63\x36\xa5\x24\xb9\x84\xbe\x0e\x38\xd2\xb4\x42\x13\xa0\xb1\xca\xa4\x7b\x9a\x7e\xce\x2d\x6c\xa8\x52\x4f\x6d\x30\xcd\xb6\xf4\xa1\xfb\xa3\xeb\x45\xb6\x21\x42\x46\x68\xeb\xd3\xbc\x76\xd9\x70\x9b\xaa\x3e\xc0\x65\x12\xf9\xa6\xaf\x8c\xc2\x29\xaf\x38\xed\x03\x3f\xb2\x52\xa1\x6b\x14\x04\xb9\x80\xe3\x41\x2f\x21\x39\xa5\x47\x43\x8e\xc7\x2e\x92\xe0\xd4\xb2\x0a\x80\x6b\xdc\x6c\x87\x96\xfd\x19\xad\x76\x3c\x7d\xd3\x59\x07\x9c\x8f\xc3\x2d\x50\x2c\xc1\x5b\x17\x79\xd3\xfa\x3c\x4c\x46\xf7\x03\x96\x52\x20\x78\xa2\x8d\x21\xf7\x81\x1a\x0f\x5c\x09\x53\x3c\x7b\x4e\xdf\x3d\xb2\xa3\xc6\x2e\xed\x47\xf7\x94\x7b\x2b\xfe\xf8\x5e\x61\x94\xd0\x9f\xb9\xab\x5a\x44\x65\xf7\x69\xac\x3c\x8c\xcc\xef\xe7\xa7\xd6\x2d\xd9\x01\x4d\xeb\x44\x85\x3e\x0d\x85\xf9\x5e\x60\x7a\x0b\xd6\x36\xfc\xd4\x7d\x2a\xc8\x0f\x5f\x20\x48\xd8\xba\x6e\x0d\xb3\x7b\xd7\xdd\x08\xad\xb8\x73\xf9\x9a\x23\x62\xaa\xb7\x85\x56\xe2\x6b\x4e\x49\x27\x64\x3e\x61\x3a\xed\x6f\x03\x7c\xe0\x5d\xb1\xb5\xb2\xf1\xa2\x88\xa3\x64\x52\x6b\x1c\x57\x71\x0d\xc4\xe1\x11\xdd\x5d\xe5\x17\x68\x91\xf2\xb1\xd3\xe1\xde\x60\xbc\x71\xc8\x53\xdb\xb9\x6d\x43\xbc\xee\x88\xe4\x94\x46\xed\x6d\x77\xa3\x94\xe7\xb5\x95\xaa\xdc\x9c\x3b\xaa\x99\xcb\x7b\x19\x5d\x9e\xf7\x08\xf4\x24\x52\xc1\x18\x5d\xe2\x26\x6e\xb9\x4d\x68\x15\xe3\x3b\x44\x46\x31\x27\xde\xe4\xde\x36\xcd\xc6\x9f\xbd\x20\x4d\xf9\x15\x6f\xb7\xa6\x99\xfe\x6a\x31\x9b\xfd\xbd\xc1\x25\x15\x8e\xf0\x11\x78\xca\x1c\x58\xe0\x82\x5b\xaa\x44\x35\xd7\x99\x6a\x5e\x27\xaa\x99\xcd\xae\x7a\x9a\xe9\x56\xfc\x6c\xf6\xe3\xd9\xce\x67\xcf\xd2\xbe\xb5\x67\x2d\xfd\x38\xfb\xd4\xf1\xf9\x5b\x0e\x49\xfa\xa4\xa5\x5f\x6c\x01\x77\x1c\xcf\xbc\x76\x5d\x59\x43\xf0\xb6\xad\x0b\x72\x69\xe9\xe7\x1a\x95\x86\xcb\x6e\xd6\x04\xf8\x74\x99\xe7\xb2\xce\x84\x4f\xb3\x1f\xff\xbc\xf3\xd9\xb3\xb4\x6f\xed\x59\x4b\x83\x05\xa3\xcf\x9e\xa5\x7d\x6b\xcf\x5a\xfa\x74\x7c\x01\xdf\x2c\xc8\x47\xb3\xe0\xf7\xef\xa2\xd9\xcf\x1f\xbe\x27\xdf\xf7\xe4\x3b\x62\x90\x8f\x66\xc1\xef\xdf\x45\xa3\x82\x39\xa9\x97\xaf\x2e\x86\xeb\x93\xdb\x5c\xaa\x27\x2f\x1f\xba\x52\x7d\x35\x2d\xd5\xff\x97\x6f\xff\x66\xb3\xdd\xaa\x3f\x7a\x6d\xce\x65\xbc\x7f\x39\x18\xeb\x78\x9a\x17\xa1\x20\x6d\xd7\x17\x7b\x29\xe0\xf3\x4e\x38\xbc\xbc\x6d\x74\xf2\xf4\xf0\x7f\x14\x7a\xa5\xfa\x30\x5c\xa7\x49\xf0\x66\x74\x09\x30\x2c\x9f\xf8\x53\x78\xdb\xcf\x52\xbf\xf1\xcc\xf6\xba\x7f\x6b\x03\x7b\xd3\xfe\xf3\x04\x70\x78\x79\x37\xe1\x93\xcb\xf3\x9b\xcb\xa8\x3e\xc9\x8b\x43\xb0\x3b\xbc\xfc\xc4\xa6\x7d\xb8\x7e\xf2\xcc\xff\x4e\x14\x1c\x37\xce\x3c\xc3\xc1\xcb\x8b\x23\x98\x71\x44\x1f\x1d\xd1\x25\x63\x39\xbd\x7b\x7e\x3a\x86\x7b\xbe\x1d\x86\x8e\x0b\xa0\xef\x29\xf7\xa5\x1e\x3b\x5a\xca\x1d\xd9\x45\xff\x13\x59\xf7\xcd\x70\x74\x44\x6f\xfd\x27\x00\x00\xff\xff\xa3\x09\x5f\x0d\x4b\x28\x00\x00")
func complySoc2PoliciesDisasterMdBytes() ([]byte, error) {
return bindataRead(
@ -717,7 +717,7 @@ func complySoc2PoliciesDisasterMd() (*asset, error) {
return nil, err
}
info := bindataFileInfo{name: "comply-soc2/policies/disaster.md", size: 169, mode: os.FileMode(420), modTime: time.Unix(1526624477, 0)}
info := bindataFileInfo{name: "comply-soc2/policies/disaster.md", size: 10315, mode: os.FileMode(420), modTime: time.Unix(1526668702, 0)}
a := &asset{bytes: bytes, info: info}
return a, nil
}
@ -737,7 +737,7 @@ func complySoc2PoliciesEncryptionMd() (*asset, error) {
return nil, err
}
info := bindataFileInfo{name: "comply-soc2/policies/encryption.md", size: 151, mode: os.FileMode(420), modTime: time.Unix(1526624477, 0)}
info := bindataFileInfo{name: "comply-soc2/policies/encryption.md", size: 151, mode: os.FileMode(420), modTime: time.Unix(1526668702, 0)}
a := &asset{bytes: bytes, info: info}
return a, nil
}
@ -757,7 +757,7 @@ func complySoc2PoliciesIncidentMd() (*asset, error) {
return nil, err
}
info := bindataFileInfo{name: "comply-soc2/policies/incident.md", size: 8552, mode: os.FileMode(420), modTime: time.Unix(1526624477, 0)}
info := bindataFileInfo{name: "comply-soc2/policies/incident.md", size: 8552, mode: os.FileMode(420), modTime: time.Unix(1526668702, 0)}
a := &asset{bytes: bytes, info: info}
return a, nil
}
@ -777,7 +777,7 @@ func complySoc2PoliciesInformationMd() (*asset, error) {
return nil, err
}
info := bindataFileInfo{name: "comply-soc2/policies/information.md", size: 5359, mode: os.FileMode(420), modTime: time.Unix(1526624477, 0)}
info := bindataFileInfo{name: "comply-soc2/policies/information.md", size: 5359, mode: os.FileMode(420), modTime: time.Unix(1526668702, 0)}
a := &asset{bytes: bytes, info: info}
return a, nil
}
@ -797,7 +797,7 @@ func complySoc2PoliciesLogMd() (*asset, error) {
return nil, err
}
info := bindataFileInfo{name: "comply-soc2/policies/log.md", size: 4307, mode: os.FileMode(420), modTime: time.Unix(1526624477, 0)}
info := bindataFileInfo{name: "comply-soc2/policies/log.md", size: 4307, mode: os.FileMode(420), modTime: time.Unix(1526668702, 0)}
a := &asset{bytes: bytes, info: info}
return a, nil
}
@ -817,7 +817,7 @@ func complySoc2PoliciesMediaMd() (*asset, error) {
return nil, err
}
info := bindataFileInfo{name: "comply-soc2/policies/media.md", size: 175, mode: os.FileMode(420), modTime: time.Unix(1526624477, 0)}
info := bindataFileInfo{name: "comply-soc2/policies/media.md", size: 175, mode: os.FileMode(420), modTime: time.Unix(1526668702, 0)}
a := &asset{bytes: bytes, info: info}
return a, nil
}
@ -837,7 +837,7 @@ func complySoc2PoliciesOfficeMd() (*asset, error) {
return nil, err
}
info := bindataFileInfo{name: "comply-soc2/policies/office.md", size: 3927, mode: os.FileMode(420), modTime: time.Unix(1526624477, 0)}
info := bindataFileInfo{name: "comply-soc2/policies/office.md", size: 3927, mode: os.FileMode(420), modTime: time.Unix(1526668702, 0)}
a := &asset{bytes: bytes, info: info}
return a, nil
}
@ -857,7 +857,7 @@ func complySoc2PoliciesPasswordMd() (*asset, error) {
return nil, err
}
info := bindataFileInfo{name: "comply-soc2/policies/password.md", size: 1796, mode: os.FileMode(420), modTime: time.Unix(1526624477, 0)}
info := bindataFileInfo{name: "comply-soc2/policies/password.md", size: 1796, mode: os.FileMode(420), modTime: time.Unix(1526668702, 0)}
a := &asset{bytes: bytes, info: info}
return a, nil
}
@ -877,7 +877,7 @@ func complySoc2PoliciesPolicyMd() (*asset, error) {
return nil, err
}
info := bindataFileInfo{name: "comply-soc2/policies/policy.md", size: 892, mode: os.FileMode(420), modTime: time.Unix(1526624477, 0)}
info := bindataFileInfo{name: "comply-soc2/policies/policy.md", size: 892, mode: os.FileMode(420), modTime: time.Unix(1526668702, 0)}
a := &asset{bytes: bytes, info: info}
return a, nil
}
@ -897,7 +897,7 @@ func complySoc2PoliciesPrivacyMd() (*asset, error) {
return nil, err
}
info := bindataFileInfo{name: "comply-soc2/policies/privacy.md", size: 346, mode: os.FileMode(420), modTime: time.Unix(1526624477, 0)}
info := bindataFileInfo{name: "comply-soc2/policies/privacy.md", size: 346, mode: os.FileMode(420), modTime: time.Unix(1526668702, 0)}
a := &asset{bytes: bytes, info: info}
return a, nil
}
@ -917,7 +917,7 @@ func complySoc2PoliciesProcessingMd() (*asset, error) {
return nil, err
}
info := bindataFileInfo{name: "comply-soc2/policies/processing.md", size: 210, mode: os.FileMode(420), modTime: time.Unix(1526624477, 0)}
info := bindataFileInfo{name: "comply-soc2/policies/processing.md", size: 210, mode: os.FileMode(420), modTime: time.Unix(1526668702, 0)}
a := &asset{bytes: bytes, info: info}
return a, nil
}
@ -937,12 +937,12 @@ func complySoc2PoliciesRemoteMd() (*asset, error) {
return nil, err
}
info := bindataFileInfo{name: "comply-soc2/policies/remote.md", size: 180, mode: os.FileMode(420), modTime: time.Unix(1526624477, 0)}
info := bindataFileInfo{name: "comply-soc2/policies/remote.md", size: 180, mode: os.FileMode(420), modTime: time.Unix(1526668702, 0)}
a := &asset{bytes: bytes, info: info}
return a, nil
}
var _complySoc2PoliciesRetentionMd = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\x3c\xcb\xb1\x8a\xc3\x30\x10\x04\xd0\x5e\x5f\x31\x70\xb5\xcc\xd9\xdc\x1d\x87\x5a\xa5\x49\x2a\x63\xe7\x07\x16\x59\x09\x1b\xac\x5d\xb0\xd6\x01\xff\x7d\xb0\x09\xa9\xe6\x31\xcc\x08\x95\x1c\x70\x22\x23\x0c\xd9\xb2\x18\xab\xa0\xd7\x99\xd3\xe6\x28\x2d\x2a\x5b\x09\x18\x7a\x57\xc9\xb8\xde\x38\xd7\xe0\x80\xeb\x18\xf7\x00\x3c\x62\x6c\x9b\xee\xe3\xbf\xe6\xf7\xed\xfe\xa7\xe9\x5c\xa1\x87\x2e\x43\x7e\x72\x65\x95\xe3\xe9\x31\x91\xe5\x80\xcb\x2a\x68\xd1\x7d\xb7\xff\xc7\x3e\x69\x29\x59\x2c\xe0\x2c\x6c\x4c\x33\x26\x4d\xeb\xde\x38\xef\xbd\x73\x5f\x88\x5a\x58\xee\x18\x55\xe5\x15\x00\x00\xff\xff\xf1\xef\x33\xc8\xb2\x00\x00\x00")
var _complySoc2PoliciesRetentionMd = []byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xd4\x58\xcd\x8e\x1c\xb7\x11\xbe\x0f\xf2\x10\x05\xf8\x22\xd9\xbd\xe3\xc8\xc8\x1f\x36\xc8\x41\xd6\x0a\x81\x83\x04\x5a\x48\x42\x72\xc9\xa5\x86\xac\x99\x2e\x89\x4d\x76\x48\xf6\xcc\xb6\xa1\x83\x5e\x23\x80\xfd\x72\x7a\x92\xa0\x8a\xec\x9e\x9e\x1f\x29\x72\x02\x07\xc8\x1c\xb4\x2d\x76\x93\xac\x9f\xaf\xbe\xaf\x48\x8f\x1d\xdd\xc2\x1d\x66\x84\x97\x94\xc9\x67\x0e\x1e\xee\x83\x63\x33\xae\xd0\xc4\xe0\xc7\xee\x16\x5e\xde\xaf\x12\x66\x4e\x5b\xa6\x74\xbb\x02\x78\xfd\xea\x99\xfc\x01\xb8\x81\x67\xcf\x9e\xac\xbf\x99\x9f\x7f\xb3\xfe\x75\x7d\xbe\xff\xd5\xfa\x9b\x55\x87\x6f\x42\x7c\x49\x7b\x4e\x1c\xbc\xce\xbc\x01\x8b\x99\x6e\xe1\x4f\x83\x87\x27\xf0\xcd\x2f\x9f\xfc\x4e\xbf\x37\xa1\xeb\xc8\xe7\x5b\xf8\xce\x73\x66\x74\x60\x83\x19\x64\x64\x75\x73\x73\xb3\x5a\x7d\xf1\xb4\xef\xc9\x5b\x36\x94\x56\xf5\xf1\x01\x9e\xde\x2e\x2d\xa6\xc8\xc1\xa6\xd5\xea\x0b\xb8\x1f\x62\x1f\x12\x01\x7a\x0b\xaf\x4c\xe8\x69\xb5\xc2\x35\xbc\x6e\x39\xc9\xde\x08\x71\x9e\xd4\xab\x9b\x60\x69\xcb\x9e\x12\xe4\x96\x20\x6c\xde\x90\xc9\xbc\xa7\xa4\xf3\x23\xfd\x63\xe0\x48\x62\x49\x82\x6d\x88\xe7\x2b\x1c\x38\xb7\xec\xcb\xcc\xb8\x43\xcf\xdf\xa3\x8c\xaf\x8f\x5b\xd6\x3d\x4c\xd8\x53\x4c\x80\xce\x95\x25\x3e\x32\xf1\xc3\xfb\x7f\x26\x30\x43\xca\xc1\x8e\x10\x22\x98\xe0\x73\x0c\xae\x01\x8e\x91\x76\x18\xad\xa3\x94\x20\x6c\x75\x62\x47\x96\x87\x4e\x1f\x75\x4d\x4e\x90\x72\x88\x64\x81\x3d\x3c\x22\x47\x26\xc7\xe0\xd9\x88\xe1\x5d\x03\x3d\xf6\x14\xeb\x33\x65\xb3\x7e\x0c\x7f\x9b\x8c\x98\xed\x6c\x96\x0b\x1f\x5a\x36\x2d\xb4\xc1\xd9\x34\x6f\x10\x69\x4b\x51\xb6\xc8\x01\x30\x01\x7b\x59\x4f\x4d\x6f\xc0\x07\xe8\x30\x67\x8a\x70\x68\x31\xeb\x4e\xc0\x59\x66\xf1\x95\x88\x60\xdf\x3b\x96\xa8\x07\x8d\xca\x90\x24\x3e\x61\xbb\x5c\x12\xd2\x98\x32\x75\xe9\xa3\x61\x2e\x0b\xe6\xb1\x67\x83\xce\x8d\xc0\xde\xb8\xc1\x52\x02\xea\x7a\x17\x46\xaa\x59\xd4\x28\xa2\xc9\x21\xa6\x46\xac\x3e\x90\x73\xf2\x17\xfd\x08\xf4\x90\x29\x7a\x74\xd0\x63\xcc\x6a\x8f\xd8\x6e\x42\x47\xc0\x3e\x07\x9d\x8b\x26\xab\x09\xb3\x3d\xb2\xe8\xd2\xce\x73\xc3\x20\x1c\x7c\x5a\xe4\x2f\xc1\xa3\x96\x22\xb1\xc7\xad\x84\xe7\x2c\x88\x1f\xde\xff\xa0\xde\x7f\x78\xff\xe3\xe3\xd3\x18\x75\x43\xca\xb0\x21\xe8\xd0\x12\x44\x42\xcb\x6e\x04\xdc\x23\x3b\xdc\x38\x3a\x09\xdd\x5a\xa0\xff\x2d\x9a\xb7\xbb\x18\x06\x6f\x6b\xb8\xcf\xcc\xe2\x04\x1b\x79\x0b\x1b\x59\xdb\x65\xee\x1d\x81\xa3\x1d\xba\x06\x22\xed\x06\x87\x39\xc4\xf1\x24\x66\x03\x3a\x08\x1b\xc7\x3b\x5d\xa1\xa4\x02\x0a\x16\x65\xff\x23\xf8\xb2\x94\x05\xb2\x4f\xba\x6f\xa2\x93\x59\x29\x73\x2f\xab\x13\xb4\xe1\x00\x2e\xf8\x5d\x99\x65\xd0\x8b\x7f\x65\x26\xd9\x46\xb7\x96\x4f\xf4\xed\xe4\xbe\xa5\x94\x63\x18\xc9\xae\xe1\xf9\x03\x76\xbd\x23\x45\xca\x4f\x33\xbc\x62\x03\x1c\x1e\xa6\xda\xd6\x79\xf5\xa5\x7a\xe2\x82\x41\x07\x6f\x86\xc8\xc9\xb2\x29\x15\x2e\x89\xbb\x4c\xb0\x09\xde\x0e\x26\x27\xd8\x0c\x49\xc8\x23\x35\x27\x9b\xa7\x92\x32\x0d\xd6\x8c\xc5\xa6\x54\x76\x47\x02\xc3\x44\x71\xcf\x86\xa0\x8f\x61\xcf\x56\x87\x04\x81\x5e\x59\xc2\x5b\x08\xb9\x2d\x59\xbd\x96\xc7\x0e\x47\x40\x97\x82\x04\x87\xfd\x3e\xb8\x7d\x29\x7a\xda\x2b\x51\xa5\xc1\xb4\x02\x2c\xc7\xb9\xba\x2f\x58\xb4\x9c\x30\x15\xf8\x29\x1b\x8d\x90\x0c\x79\x8c\x1c\x2a\xe8\x2b\xd9\x49\x2a\x73\x80\x16\xf7\x04\x68\x8c\x10\x4e\x0e\x10\x22\xef\x58\xea\x64\x89\x7b\x96\x85\x2d\x45\xf9\xa0\x8f\x21\x93\xc9\xd7\x29\x8d\x7d\xa6\x48\x29\x6b\x51\xe4\x56\xe8\x59\x4a\x3d\xa7\xff\x2e\x3a\xf0\x34\x81\xd0\x71\x1a\x5c\x6e\x2e\x93\x24\x61\xf2\x54\xeb\x2c\x9a\x96\xf7\x45\x15\x94\x25\x4f\x1c\x11\x6a\x17\x54\x8a\x2b\x12\x0a\xce\x3a\x79\x43\x3a\x9f\x6c\xe5\xfe\xf1\x26\x87\x1b\x8b\x23\x84\x9e\x62\x81\xce\x7a\x05\x2b\xf8\x7b\x8f\x3b\xda\x44\xc2\xb7\xa0\x0a\x54\xe4\x53\x52\xf7\xe5\x77\x8b\x5d\x66\xb9\xfa\x72\xa5\xaa\xc7\xeb\x85\x82\x89\x3c\xa9\x10\x59\x49\x9d\xd2\x30\x4a\xd8\x3c\x7a\x43\xe7\xc4\xc8\x1e\x50\x82\x23\x18\xac\xe9\x75\xe2\x1d\xf9\x3d\xc7\xe0\x45\xaf\x2a\x7d\xd7\x0a\x2b\x89\x24\xad\x7c\xf4\x80\x43\x6e\x43\xe4\xef\xc9\x2a\x7b\xc0\x4c\xae\x96\x3d\x46\x91\xab\x21\x96\x1c\x4d\xf8\x5e\xc3\x6c\xf3\xd2\xa5\x21\x15\xe4\x29\x0f\xd0\x9e\x5c\xe8\x65\xf3\x06\x52\xc6\x1d\xfb\x5d\x29\x8b\x4c\x29\xb3\xdf\xc9\x7a\x13\x85\xa6\x56\xa8\xcb\x87\xbc\xac\x7f\xd8\xd0\x18\xe4\xfb\x96\x38\x02\xaa\x10\xcb\x16\xd0\xab\xbc\x83\x57\x4a\xed\x59\xf7\x2c\x98\xfb\x44\x04\xa4\x7a\xaa\xc9\xdf\xaa\xca\xe3\x0c\x93\x45\x0f\x50\x56\x3e\x17\x1e\xb5\x4e\xe2\xe6\xaf\x98\x11\xb6\x40\x0f\x68\xb2\x1b\x21\x1f\x02\x8c\x84\x31\xc1\x36\x86\x4e\x11\x6d\x22\xd5\xd8\x78\x55\x6b\xf4\x40\x0f\x86\xfa\x29\xcb\x61\x53\x9d\xed\x29\x76\x9c\x35\x30\x38\xa1\x2f\x44\x48\x6d\x88\xa5\x4c\x4f\x6d\x2c\x3c\x30\xe5\x03\x06\xaf\x94\x9b\xfa\xe0\x13\x8b\x1a\x6c\xb5\xb4\x4e\x71\xad\x0c\x2a\x75\x4d\xa9\x54\xe6\x6c\xc9\x31\x36\x4f\x55\x93\xe4\xe5\x55\x4f\x4f\x60\x97\x40\x98\x43\xe1\x67\x4c\x88\x56\xb1\xa9\x2c\x97\x97\xd2\xee\xad\xc8\x7b\x0c\x42\x4b\xf3\x8e\xa9\xb9\x34\x4d\x22\x5c\x0a\xb3\x94\x18\xce\x35\x30\xf9\xfc\x42\x76\x28\xe8\xaa\xc5\x51\x0b\xb9\x5a\x58\x4d\x6a\xae\xbb\x7e\x22\x1e\xb3\xc7\xcf\xd1\xb4\x67\x81\xd4\xd6\xe6\xd3\xb1\xe4\x5c\x52\x2b\x54\x35\x24\xf9\x57\x79\x44\xa8\x29\x06\xad\xae\xc2\x4d\x75\x43\x51\x04\x8d\x91\xe4\xb7\x2a\xe5\x49\x3b\xa9\x5d\xdc\x1c\xb4\x92\xdd\xa5\x0d\x17\x06\x1a\x79\x63\xa9\x36\x0e\x1b\xba\xb0\x30\x1c\x3c\xc5\xa3\x9b\xe7\xb2\xa1\x4c\xac\xa2\x29\xf5\xed\x13\x39\x25\x39\x4e\x69\x20\x41\xe0\x51\x2d\xa4\xe7\x93\x3d\x8e\xc8\x11\x4e\x5c\xec\x14\x49\x94\xb3\x38\xd6\x07\xc5\xa9\xc8\xad\xd6\xac\x08\xef\x71\xad\x06\x30\x6e\x38\xc7\x59\x86\x94\xba\xc1\x38\xe4\x2e\x35\x60\xa9\x43\x6f\xe5\x81\x53\x3f\x64\x52\x81\x58\x2a\x7a\xa9\xee\x25\x47\x5c\x01\x1f\xfb\x94\x63\x21\x82\x5a\x88\xaa\xe6\x4b\x57\xcf\xb2\x3f\xc9\xce\x59\x7f\x08\xb8\xdd\xb2\x63\xcc\x64\x27\x58\x93\x34\x83\xbd\xb4\x8a\xb5\x98\xf2\x10\xfd\x39\x19\x17\xc2\xea\x83\x80\x20\x55\x47\x6b\xef\x37\xe5\xfe\x44\x99\x86\x5e\x48\x86\x7a\xac\x71\x41\x6f\xbf\x56\xc7\x73\x85\xc7\xfa\x2a\xdb\x6a\x82\x53\x31\x84\x64\xbc\xd6\xc6\x4c\x15\x4d\x2d\x0f\xe5\x94\x09\x8b\x13\x43\x6e\x4f\xdb\xf5\xe2\x79\xd7\x0d\x9e\x8d\x74\x66\x59\xbb\xb6\x52\x56\xa9\x64\xdf\xd1\x1e\x7d\x9e\x5a\xe3\xf5\xa5\xa2\x3d\x9d\x76\x3b\x2a\xda\x3c\x74\xa6\x68\x89\xcc\x20\xd0\x95\xa2\xc1\xdd\x85\xa2\x69\xcf\xa2\x38\xbb\xa8\x3b\x29\x4d\x5f\x70\xcf\xbe\x08\x59\x29\x90\xf1\x5c\xc7\xd2\x67\x08\x19\x6c\x86\xbc\xe8\x3b\x23\xd3\xfe\x28\x8b\xb6\x63\xcf\x49\xd0\x2a\x7a\x4f\x89\x77\x5e\xb1\xb0\x19\x8f\x28\x40\x8f\xbb\x65\x8e\xe4\xf7\x64\x0d\xf7\xed\x98\xe4\x18\x02\x8f\x68\xbd\x5b\xd7\xe3\xd6\x63\x6d\xb6\xa2\x4d\x97\x74\xc7\xfe\x22\x24\x8f\xa4\xc0\x33\x69\x95\x6c\xb7\xf2\xf8\xb8\x64\xc9\x11\x46\x37\x82\xc3\x0d\xb9\x5a\x01\x95\x05\x37\xe1\x81\x12\x78\xec\xb4\x18\x3f\xc1\x07\xd5\xca\xe7\xc7\x53\xe1\x47\x2d\x2b\x47\x9d\x1c\xd9\xe4\xa9\x01\x9c\xcf\x31\x89\xb2\x04\xe3\xea\x4e\x47\xde\xef\x23\x2b\xa2\x42\x75\xb1\x96\x91\xdf\xb2\x2d\x54\xc1\x79\x6c\xb4\x29\xdc\x45\xce\x55\x30\x6a\x62\x59\x5e\x4e\x47\xdc\xc5\x1e\xa7\xbc\x56\xd5\x7c\x01\xf7\x7f\x23\xe4\xbf\xad\x32\x7d\x14\xe5\x4b\x85\xaa\x8a\x9c\xae\xca\xf1\x24\x48\xcf\x67\x3d\x9b\x23\x57\x69\xb2\xe0\xe4\x33\x92\xa0\x5d\xeb\x6e\x60\x4b\x8e\x3d\x35\x6a\xcc\x15\x3f\xba\xa0\x91\x43\x3f\x1b\x5f\x7b\xd2\x5d\x44\x9f\xab\x62\x2e\xb7\xd2\xc4\x21\xec\x39\xa3\x83\x96\x05\x56\x8a\xc8\xbe\xde\x88\x4c\xe7\x02\x13\x62\x1f\xa2\x64\xa8\x62\xa0\x39\x1e\x5c\xa6\x86\xcd\xb4\x42\x0b\xee\xeb\x1c\xe5\x20\x93\xc8\x44\x9a\x1b\xaa\x9f\xe6\x86\xc6\xfb\x3f\x70\xc3\x71\xc7\x1a\xd3\xa9\x70\xcf\xdd\xa0\x0e\xd9\x35\x90\x23\xee\xc9\x01\x67\xf6\x14\x31\x72\x51\x64\xba\xc9\x91\x7b\x40\xbb\xe7\x14\xca\x60\xd0\x73\x8a\xd4\xb1\x1b\x2b\xc8\x7b\x32\xbc\x65\x33\x1d\x25\x97\x67\xc7\x99\x92\x67\x2d\x3a\x51\xef\x5a\xe5\xf7\xcf\xbe\x83\xbb\x57\xaf\x1a\xf8\xe3\xdd\xfd\xcb\x7a\xaf\x72\x95\xba\x2f\xda\x11\x78\x34\x91\xe3\x86\x5c\x38\x3c\x86\x4a\x7d\xe4\xed\x84\x7e\x72\xd8\xa7\xb9\xe5\x39\x46\x75\x0d\x70\x49\xc5\x77\x47\xaa\x3f\x92\xf1\x62\xf0\xca\x01\xa3\x9f\x28\x4b\x22\x33\x65\xfc\x44\x33\xd2\xb0\xdd\xb2\x61\x39\x4e\xa8\x20\x78\x4b\x97\x8d\x91\x5e\x91\x4c\xd2\xac\xad\x5a\xbd\xbc\xd3\x5b\x2b\x65\x58\xac\x7c\xbd\xe0\xe5\xae\xa3\x68\x18\x9d\x1b\x6f\x8e\x37\x1a\x1d\xa1\x4f\x1f\xef\x60\x4a\x14\xf5\x5c\x84\xac\xaa\x39\xcb\xa0\x74\x8e\x19\x59\xe8\xd1\x71\xca\x12\xc2\xb9\xc0\x97\x1e\x75\x94\x5b\xd1\xb7\x25\x4f\x09\x00\x49\xba\x82\x3c\xf6\x17\xc2\x34\xd1\x62\x03\x87\x96\xb4\x77\x61\x7f\x8c\xdc\x44\xdd\x1d\x59\xc6\x19\x99\xcf\xee\x6e\x5e\xbe\xf8\x4b\x6a\xe0\xee\xaf\x77\xa9\x81\x0d\x9a\xb7\x43\x0f\x19\x7b\x81\x61\x8b\xd1\x82\x8d\xbc\x97\xff\x74\x61\xc3\x4e\x8f\x4e\x6c\x14\xb8\x21\x66\x8d\x44\xf9\x00\xb4\x34\xf4\x36\x64\x83\x69\xae\x57\x19\xae\x8b\x6e\xd9\x51\x5a\xa8\xcf\x59\x63\x72\xbc\xf4\x9b\x11\x98\xda\x48\xd6\xaa\x62\x96\x36\x61\xa9\xa2\xe5\xa5\x8c\x17\x93\x7e\x0f\x07\x4c\x99\xe6\xc9\x05\x80\xf5\xba\x2d\x52\x17\x26\xf1\x9c\x62\xdd\x53\x4c\xc1\x7b\x6d\xb8\x70\x79\xbe\x55\x8e\xd7\x58\x0a\x23\xd5\x2e\xe3\xbc\xf4\x4b\xa3\x59\xcf\x50\x12\xf3\xa9\xb5\xb6\xcd\x74\xb7\x29\xeb\x0c\xe9\xc8\xb5\xe7\x17\x5c\x13\xc6\xd9\xc3\xf1\xaa\xb8\x81\x0f\xef\x7f\xb8\xb8\x2d\x5e\x7f\x78\xff\x23\xac\x7e\xb1\x3a\x3b\xbe\x7f\xf2\x86\x19\x56\xab\xaf\x6e\x2e\x7e\x57\x86\xae\x8d\x7d\xd6\xd0\x57\xab\x77\x27\xcc\xf1\x5a\x40\x79\x3a\xf4\x42\xe5\xf6\x1d\xbc\xaa\xe8\xfb\x73\x30\xe5\xc5\xbb\x0b\x83\xe1\x5d\xed\xc8\xd0\xcd\x23\xab\xaf\xfe\x70\xf1\xbb\x32\x74\x6d\xec\xb3\x86\xc4\x83\x8b\xdf\x95\xa1\x6b\x63\x9f\x35\xf4\xee\xe7\xdf\xe0\x7f\x90\xe4\x9f\xd9\x83\xff\xfb\x10\xfd\x2b\x00\x00\xff\xff\x8e\x64\x5d\xe4\x9b\x1a\x00\x00")
func complySoc2PoliciesRetentionMdBytes() ([]byte, error) {
return bindataRead(
@ -957,7 +957,7 @@ func complySoc2PoliciesRetentionMd() (*asset, error) {
return nil, err
}
info := bindataFileInfo{name: "comply-soc2/policies/retention.md", size: 178, mode: os.FileMode(420), modTime: time.Unix(1526624477, 0)}
info := bindataFileInfo{name: "comply-soc2/policies/retention.md", size: 6811, mode: os.FileMode(420), modTime: time.Unix(1526668702, 0)}
a := &asset{bytes: bytes, info: info}
return a, nil
}
@ -977,7 +977,7 @@ func complySoc2PoliciesRiskMd() (*asset, error) {
return nil, err
}
info := bindataFileInfo{name: "comply-soc2/policies/risk.md", size: 158, mode: os.FileMode(420), modTime: time.Unix(1526624477, 0)}
info := bindataFileInfo{name: "comply-soc2/policies/risk.md", size: 158, mode: os.FileMode(420), modTime: time.Unix(1526668702, 0)}
a := &asset{bytes: bytes, info: info}
return a, nil
}
@ -997,7 +997,7 @@ func complySoc2PoliciesVendorMd() (*asset, error) {
return nil, err
}
info := bindataFileInfo{name: "comply-soc2/policies/vendor.md", size: 159, mode: os.FileMode(420), modTime: time.Unix(1526624477, 0)}
info := bindataFileInfo{name: "comply-soc2/policies/vendor.md", size: 159, mode: os.FileMode(420), modTime: time.Unix(1526668702, 0)}
a := &asset{bytes: bytes, info: info}
return a, nil
}
@ -1017,7 +1017,7 @@ func complySoc2PoliciesWorkstationMd() (*asset, error) {
return nil, err
}
info := bindataFileInfo{name: "comply-soc2/policies/workstation.md", size: 1791, mode: os.FileMode(420), modTime: time.Unix(1526624477, 0)}
info := bindataFileInfo{name: "comply-soc2/policies/workstation.md", size: 1791, mode: os.FileMode(420), modTime: time.Unix(1526668702, 0)}
a := &asset{bytes: bytes, info: info}
return a, nil
}
@ -1037,7 +1037,7 @@ func complySoc2ProceduresReadmeMd() (*asset, error) {
return nil, err
}
info := bindataFileInfo{name: "comply-soc2/procedures/README.md", size: 92, mode: os.FileMode(420), modTime: time.Unix(1526624477, 0)}
info := bindataFileInfo{name: "comply-soc2/procedures/README.md", size: 92, mode: os.FileMode(420), modTime: time.Unix(1526668702, 0)}
a := &asset{bytes: bytes, info: info}
return a, nil
}
@ -1057,7 +1057,7 @@ func complySoc2ProceduresOffboardingMd() (*asset, error) {
return nil, err
}
info := bindataFileInfo{name: "comply-soc2/procedures/offboarding.md", size: 55, mode: os.FileMode(420), modTime: time.Unix(1526624477, 0)}
info := bindataFileInfo{name: "comply-soc2/procedures/offboarding.md", size: 55, mode: os.FileMode(420), modTime: time.Unix(1526668702, 0)}
a := &asset{bytes: bytes, info: info}
return a, nil
}
@ -1077,7 +1077,7 @@ func complySoc2ProceduresOnboardingMd() (*asset, error) {
return nil, err
}
info := bindataFileInfo{name: "comply-soc2/procedures/onboarding.md", size: 57, mode: os.FileMode(420), modTime: time.Unix(1526624477, 0)}
info := bindataFileInfo{name: "comply-soc2/procedures/onboarding.md", size: 57, mode: os.FileMode(420), modTime: time.Unix(1526668702, 0)}
a := &asset{bytes: bytes, info: info}
return a, nil
}
@ -1097,7 +1097,7 @@ func complySoc2ProceduresPatchMd() (*asset, error) {
return nil, err
}
info := bindataFileInfo{name: "comply-soc2/procedures/patch.md", size: 75, mode: os.FileMode(420), modTime: time.Unix(1526624477, 0)}
info := bindataFileInfo{name: "comply-soc2/procedures/patch.md", size: 75, mode: os.FileMode(420), modTime: time.Unix(1526668702, 0)}
a := &asset{bytes: bytes, info: info}
return a, nil
}
@ -1117,7 +1117,7 @@ func complySoc2ProceduresWorkstationMd() (*asset, error) {
return nil, err
}
info := bindataFileInfo{name: "comply-soc2/procedures/workstation.md", size: 92, mode: os.FileMode(420), modTime: time.Unix(1526624477, 0)}
info := bindataFileInfo{name: "comply-soc2/procedures/workstation.md", size: 92, mode: os.FileMode(420), modTime: time.Unix(1526668702, 0)}
a := &asset{bytes: bytes, info: info}
return a, nil
}
@ -1137,7 +1137,7 @@ func complySoc2StandardsReadmeMd() (*asset, error) {
return nil, err
}
info := bindataFileInfo{name: "comply-soc2/standards/README.md", size: 282, mode: os.FileMode(420), modTime: time.Unix(1526624477, 0)}
info := bindataFileInfo{name: "comply-soc2/standards/README.md", size: 282, mode: os.FileMode(420), modTime: time.Unix(1526668702, 0)}
a := &asset{bytes: bytes, info: info}
return a, nil
}
@ -1157,7 +1157,7 @@ func complySoc2StandardsTsc2017Yml() (*asset, error) {
return nil, err
}
info := bindataFileInfo{name: "comply-soc2/standards/TSC-2017.yml", size: 16305, mode: os.FileMode(420), modTime: time.Unix(1526624477, 0)}
info := bindataFileInfo{name: "comply-soc2/standards/TSC-2017.yml", size: 16305, mode: os.FileMode(420), modTime: time.Unix(1526668702, 0)}
a := &asset{bytes: bytes, info: info}
return a, nil
}
@ -1177,7 +1177,7 @@ func complySoc2TemplatesDefaultLatex() (*asset, error) {
return nil, err
}
info := bindataFileInfo{name: "comply-soc2/templates/default.latex", size: 7649, mode: os.FileMode(420), modTime: time.Unix(1526624477, 0)}
info := bindataFileInfo{name: "comply-soc2/templates/default.latex", size: 7649, mode: os.FileMode(420), modTime: time.Unix(1526668702, 0)}
a := &asset{bytes: bytes, info: info}
return a, nil
}
@ -1197,7 +1197,7 @@ func complySoc2TemplatesIndexAce() (*asset, error) {
return nil, err
}
info := bindataFileInfo{name: "comply-soc2/templates/index.ace", size: 7596, mode: os.FileMode(420), modTime: time.Unix(1526624477, 0)}
info := bindataFileInfo{name: "comply-soc2/templates/index.ace", size: 7596, mode: os.FileMode(420), modTime: time.Unix(1526668702, 0)}
a := &asset{bytes: bytes, info: info}
return a, nil
}

View File

@ -8,4 +8,111 @@ majorRevisions:
comment: Initial document
---
# Coming Soon
# Purpose and Scope
a. This application security policy defines the security framework and requirements for applications, notably web applications, within the organizations production environment.
a. This document also provides implementing controls and instructions for web application security, to include periodic vulnerability scans and other types of evaluations and assessments.
a. This policy applies to all applications within the organization production environment, as well as administrators and users of these applications. This typically includes employees and contractors.
# Background
a. Application vulnerabilities typically account for the largest number of initial attack vectors after malware infections. As a result, it is important that applications are designed with security in mind, and that they are scanned and continuously monitored for malicious activity that could indicate a system compromise. Discovery and subsequent mitigation of application vulnerabilities will limit the organizations attack surface, and ensures a baseline level of security across all systems.
a. In addition to scanning guidance, this policy also defines technical requirements and procedures to ensure that applications are properly hardened in accordance with security best practices.
# References
a. Data Classification Policy
a. OWASP Risk Rating Methodology
a. OWASP Testing Guide
a. OWASP Top Ten Project
# Policy
a. The organization must ensure that all applications it develops and/or acquires are securely configured and managed.
a. The following security best practices must be considered and, if feasible, applied as a matter of the applications security design:
i. Data handled and managed by the application must be classified in accordance with the Data Classification Policy (reference (a)).
i. If the application processes confidential information, a confidential record banner must be prominently displayed which highlights the type of confidential data being accessed (e.g., personally-identifiable information (PII), protected health information (PHI), etc.)
i. Sensitive data, especially data specifically restricted by law or policy (e.g., social security numbers, passwords, and credit card data) should not be displayed in plaintext.
i. Ensure that applications validate input properly and restrictively, allowing only those types of input that are known to be correct. Examples include, but are not limited to cross-site scripting, buffer overflow errors, and injection flaws.
i. Ensure that applications execute proper error handling so that errors will not provide detailed system information to an unprivileged user, deny service, impair security mechanisms, or crash the system.
i. Where possible, authorize access to applications by affiliation, membership or employment, rather than by individual. Provide an automated review of authorizations on a regular basis, where possible.
i. Ensure that applications encrypt data at rest and in transit.
i. Implement application logging to the extent practical. Retain logs of all users and access events for at least 14 days.
i. Qualified peers conduct security reviews of code for all new or significantly modified applications; particularly, those that affect the collection, use, and/or display of confidential data. Document all actions taken.
i. Implement a change management process for changes to existing software applications.
i. Standard configuration of the application must be documented.
i. Default passwords used within the application, such as for administrative control panels or integration with databases must be changed immediately upon installation.
i. Applications must require complex passwords in accordance with current security best practices (at least 8 characters in length, combination of alphanumeric upper/lowercase characters and symbols).
i. During development and testing, applications must not have access to live data.
a. Where applications are acquired from a third party, such as a vendor:
i. Only applications that are supported by an approved vendor shall be procured and used.
i. Full support contracts must be arranged with the application vendor for full life-cycle support.
i. No custom modifications may be applied to the application without confirmation that the vendor can continue to provide support.
i. Updates, patches and configuration changes issued by the vendor shall be implemented as soon as possible.
i. A full review of applications and licenses shall be completed at least annually, as part of regular software reviews.
a. Web applications must be assessed according to the following criteria:
i. New or major application releases must have a full assessment prior to approval of the change control documentation and/or release into the production environment.
i. Third-party or acquired applications must have a full assessment prior to deployment.
i. Software releases must have an appropriate assessment, as determined by the organizations information security manager, with specific evaluation criteria based on the security risks inherent in the changes made to the applications functionality and/or architecture.
i. Emergency releases may forego security assessments and carry the assumed risk until a proper assessment can be conducted. Emergency releases must be approved by the Chief Information Officer or designee.
a. Vulnerabilities that are discovered during application assessments must be mitigated based upon the following risk levels, which are based on the Open Web Application Security Project (OWASP) Risk Rating Methodology (reference (b)):
i. High - issues categorized as high risk must be fixed immediately, otherwise alternate mitigation strategies must be implemented to limit exposure before deployment. Applications with high risk issues are subject to being taken off-line or denied release into the production environment.
i. Medium - issues categorized as medium risk must be reviewed to determine specific items to be mitigated. Actions to implement mitigations must be scheduled. Applications with medium risk issues may be taken off-line or denied release into the production environment based on the number of issues; multiple issues may increase the risk to an unacceptable level. Issues may be fixed in patch releases unless better mitigation options are present.
i. Low - issues categorized as low risk must be reviewed to determine specific items to be mitigated. Actions to implement mitigations must be scheduled.
a. Testing is required to validate fixes and/or mitigation strategies for any security vulnerabilities classified as Medium risk or greater.
a. The following security assessment types may be leveraged to perform an application security assessment:
i. Full - comprised of tests for all known web application vulnerabilities using both automated and manual tools based on the OWASP Testing Guide (reference (c)). A full assessment must leverage manual penetration testing techniques to validate discovered vulnerabilities to determine the overall risk of any and all discovered issues.
i. Quick - consists of an automated scan of an application for, at a minimum, the OWASP Top Ten web application security risks (reference (d)).
i. Targeted - verifies vulnerability remediation changes or new application functionality.
i. To counter the risk of unauthorized access, the organization maintains a Data Center Security Policy (reference (c)).
i. Security requirements for the software development life cycle, including system development, acquisition and maintenance are defined in the Software Development Lifecycle Policy (reference (d)).
i. Security requirements for handling information security incidents are defined in the Security Incident Response Policy (reference (e)).
i. Disaster recovery and business continuity management policy is defined in the Disaster Recovery Policy (reference (f)).
i. Requirements for information system availability and redundancy are defined in the System Availability Policy (reference (g)).

View File

@ -8,4 +8,61 @@ majorRevisions:
comment: Initial document
---
# Coming Soon
# Purpose and Scope
a. The purpose of this policy is to define the procedures to assess and treat information security risks within the organization, and to define the acceptable level of risk overall.
a. Risk assessment and risk treatment are applied to the entire scope of the organizations information security program, and to all information systems which are used within the organization or which could have an impact on the organizations information security.
a. This policy applies to all management and employees that take part in the organizations risk assessments. This policy must be made readily available to all whom it applies to.
# Background
a. This policy defines a step-by-step process for conducting risk assessments, as well as to treat identified risks from an information security perspective. This policy also describes how to prepare the Risk Assessment Report required as part of the risk assessment process.
a. When conducting a risk assessment, the organization must identify all organizational information systems . It must then identify all threats and vulnerabilities having to do with such systems , and rate the severity of such threats and vulnerabilities according to a predefined rating scale. Asset and risk owners must be defined for each risk item.
a. Once the risk assessment is completed, the organization shall determine how to manage risks where the overall assessed risk rating is deemed as too high. This management is known as risk treatment. Risk treatment options include but are not limited to applying security controls, outsourcing risk, accepting risk, or discontinuing the activity associated with the risk.
a. A penetration test must be performed by a third party to verify the accuracy of the risk assessment and effectiveness of deployed risk treatments.
# Procedure To Execute Risk Assessment Report
a. Confirms that the entire risk assessment and risk treatment process has been carried out according to the Risk Assessment Policy.
a. The purpose of the risk assessment was to identify all information systems their vulnerabilities, and threats that could exploit vulnerabilities. These parameters were further evaluated in order to establish the criticality of individual risks.
a. The purpose of the risk treatment was to define the systematic means of reducing or controlling the risks identified in the risk assessment.
a. All risk assessment and treatment activities were completed within the scope of the organizations information security program.
a. The risk assessment was implemented in the period from [day/month/year] to [day/month/year]. The risk treatment was implemented from [day/month/year] to [day/month/year]. Final reports were prepared during [specify period].
a. The risk assessment and risk treatment process was managed by [person responsible for managing the risk assessment process] with expert assistance provided by [person or company responsible for assistance].
a. During the risk assessment, information was collected through questionnaires and interviews with responsible persons, namely the asset owners across organizational units.
a. The process was conducted as follows:
i. All information systems and their owners were identified.
i. Threats were identified for each asset, and corresponding vulnerabilities were identified for each threat.
i. Risk owners were identified for each risk.
i. Consequences of the loss of confidentiality, integrity and availability were evaluated using a score from 0 to 2, with 0 being the lowest rating and 2 being the highest rating.
i. The likelihood of risk occurrence (i.e. that the threat will exploit the vulnerability) was evaluated using a score from 0 to 2, with 0 being the lowest rating and 2 being the highest rating.
i. The level of risk was calculated by adding up the consequence and likelihood.
i. Risks with a score of 3 or 4 were determined to be unacceptable risks.
i. For each unacceptable risk, a risk treatment option was considered, and appropriate information security controls were selected.
i. After controls were applied, residual risks were assessed.
a. The following documents were used or generated during the implementation of risk assessment and risk treatment:
i. Risk Assessment Table (Appendix A): for each combination of systems , vulnerabilities and threats, this table shows the values for consequence and likelihood, and calculates the risk.
i. Risk Treatment Table (Appendix B): defines the options for risk treatment, selection of controls for each unacceptable risk, and the level of residual risk.

View File

@ -8,5 +8,144 @@ majorRevisions:
- date: Jun 1 2018
comment: Initial document
---
#Purpose and Scope
# Coming Soon
a. The purpose of this policy is to define the organizations procedures to recover Information Technology (IT) infrastructure and IT services within set deadlines in the case of a disaster or other disruptive incident. The objective of this plan is to complete the recovery of IT infrastructure and IT services within a set Recovery Time Objective (RTO).
a. This policy includes all resources and processes necessary for service and data recovery, and covers all information security aspects of business continuity management.
a. This policy applies to all management, employees and suppliers that are involved in the recovery of IT infrastructure and services within the organization. This policy must be made readily available to all whom it applies to.
# Background
a. This policy defines the overall disaster recovery strategy for the organization. The strategy describes the organizations Recovery Time Objective (RTO), which is defined as the duration of time and service level for critical business processes to be restored after a disaster or other disruptive event, as well as the procedures, responsibility and technical guidance required to meet the RTO. This policy also lists the contact information for personnel and service providers that may be needed during a disaster recovery event.
a. The following conditions must be met for this plan to be viable:
i. All equipment, software and data (or their backups/failovers) are available in some manner.
i. If an incident takes place at the organizations physical location, all resources involved in recovery efforts are able to be transferred to an alternate work site (such as their home office) to complete their duties.
i. The Information Security Officer is responsible for coordinating and conducting a bi-annual (at least) rehearsal of this continuity plan.
a. This plan does not cover the following types of incidents:
i. Incidents that affect customers or partners but have no effect on the organizations systems; in this case, the customer must employ their own continuity processes to make sure that they can continue to interact with the organization and its systems.
i. Incidents that affect cloud infrastructure suppliers at the core infrastructure level, including but not limited to Google, Heroku, and Amazon Web Services. The organization depends on such suppliers to employ their own continuity processes.
# Policy
a. *Relocation*
i. If the organizations primary work site is unavailable, an alternate work site shall be used by designated personnel. The organizations alternate work site is located at [list the address of the alternate work site that the organization will use].
i. The personnel required to report to the alternate work site during a disaster includes [list the personnel titles responsible for reporting to the alternate work site].
a. *Critical Services, Key Tasks and, Service Level Agreements (SLAs)*
i. The following services and technologies are considered to be critical for business operations, and must immediately be restored (in priority order):
1. [list the critical services and technologies that must remain running during a disaster]
i. The following key tasks and SLAs must be considered during a disaster recovery event, in accordance with the organizations objectives, agreements, and legal, contractual or regulatory obligations:
1. [list of key tasks / SLAs that must be kept operational, with respective deadlines]
a. The organizations Recovery Time Objective (RTO) is [set the maximum amount of time before critical processes must be restored, to include relocation and getting critical services/technologies back online]. Relocation and restoration of critical services and technologies must be completed within this time period.
a. *Notification of Plan Initiation*
i. The following personnel must be notified when this plan is initiated:
1. [list all personnel (including titles) that must be notified of plan initiation ]
i. [person responsible for notifications, including title] is responsible for notifying the personnel listed above.
a. *Plan Deactivation*
i. This plan must only be deactivated by [person or persons with authority to deactivate the plan, including job title].
i. In order for this plan to be deactivated, all relocation activities and critical service / technology tasks as detailed above must be fully completed and/or restored. If the organization is still operating in an impaired scenario, the plan may still be kept active at the discretion of [person or persons with authority to deactivate the plan, including job title].
i. The following personnel must be notified when this plan is deactivated:
1. [list all personnel (including titles) that must be notified of plan activation]
a. The organization must endeavor to restore its normal level of business operations as soon as possible.
a. A list of relevant points of contact both internal and external to the organization is enclosed in Appendix A.
a. During a crisis, it is vital for certain recovery tasks to be performed right away. The following actions are pre-authorized in the event of a disaster recovery event:
i. [job title] must take all steps specified in this disaster recovery plan in order to recover the organizations information technology infrastructure and services.
i. [job title] is authorized to make urgent purchases of equipment and services up to [amount].
i. [job title] is authorized to communicate with clients.
i. [job title] is authorized to communicate with the public.
i. [job title] is authorized to communicate with public authorities such as state and local governments and law enforcement.
i. [job title] is authorized to cooperate with [name of supplier/outsourcing partner].
i. [add/modify/remove authorizations in this section as necessary]
a. Specific recovery steps for information systems infrastructure and services are provided in Appendix B.
\pagebreak
# Appendix A: Relevant Points of Contact
Internal Contacts
+------------------+-------------------+------------------+------------------+-----------------+
| Name | Job Title | Phone Number | Email Address |Alternate Contact|
+==================+===================+==================+==================+=================+
| | | | | |
| | | | | |
+------------------+-------------------+------------------+------------------+-----------------+
| | | | | |
| | | | | |
+------------------+-------------------+------------------+------------------+-----------------+
External Contacts
+------------------+-------------------+------------------+------------------+-----------------+
| Name | Job Title | Phone Number | Email Address |Alternate Contact|
+==================+===================+==================+==================+=================+
| | | | | |
| | | | | |
+------------------+-------------------+------------------+------------------+-----------------+
| | | | | |
| | | | | |
+------------------+-------------------+------------------+------------------+-----------------+
\pagebreak
# Appendix B: Recovery Steps for Information Systems Infrastructure & Services
Specific recovery procedures are described in detail below:
+----------------------------+----------------------+------------------------------------+
| Recovery Procedure | Person Responsible | Person(s) Notified When Complete |
+============================+======================+====================================+
| System to be recovered: | | |
| | | |
+----------------------------+----------------------+------------------------------------+
| task 1: | | |
| | | |
+----------------------------+----------------------+------------------------------------+
| task 2: | | |
| | | |
+----------------------------+----------------------+------------------------------------+
| System to be recovered: | | |
| | | |
+----------------------------+----------------------+------------------------------------+
| task 1: | | |
| | | |
+----------------------------+----------------------+------------------------------------+
| task 2: | | |
| | | |
+----------------------------+----------------------+------------------------------------+

View File

@ -10,4 +10,79 @@ majorRevisions:
comment: Initial document
---
# Coming Soon
#Appendices
Appendix A: Retention Periods
# Purpose and Scope
a. This data retention policy defines the objectives and requirements for data retention within the organization.
a. This policy covers all data within the organizations custody or control, irregardless of the medium the data is stored in (electronic form, paper form, etc.) Within this policy, the medium which holds data is referred to as information, no matter what form it is in.
a. This policy applies to all users of information systems within the organization. This typically includes employees and contractors, as well as any external parties that come into contact with systems and information the organization owns or controls (hereinafter referred to as “users”). This policy must be made readily available to all users.
# Background
a. The organization is bound by multiple legal, regulatory and contractual obligations with regard to the data it retains. These obligations stipulate how long data can be retained, and how data must be destroyed. Examples of legal, regulatory and contractual obligations include laws and regulations in the local jurisdiction where the organization conducts business, and contracts made with employees, customers, service providers, partners and others.
a. The organization may also be involved in events such as litigation or disaster recovery scenarios that require it to have access to original information in order to protect the organizations interests or those of its employees, customers, service providers, partners and others. As a result, the organization may need to archive and store information for longer that it may be needed for day-to-day operations.
\pagebreak
# Policy
a. *Information Retention*
i. Retention is defined as the maintenance of information in a production or live environment which can be accessed by an authorized user in the ordinary course of business.
i. Information used in the development, staging, and testing of systems shall not be retained beyond their active use period nor copied into production or live environments.
i. By default, the retention period of information shall be an active use period of exactly two years from its creation unless an exception is obtained permitting a longer or shorter retention period. The business unit responsible for the information must request the exception.
i. After the active use period of information is over in accordance with this policy and approved exceptions, information must be archived for a defined period. Once the defined archive period is over, the information must be destroyed.
i. Each business unit is responsible for the information it creates, uses, stores, processes and destroys, according to the requirements of this policy. The responsible business unit is considered to be the information owner.
i. The organizations legal counsel may issue a litigation hold to request that information relating to potential or actual litigation, arbitration or other claims, demands, disputes or regulatory action be retained in accordance with instructions from the legal counsel.
i. Each employee and contractor affiliated with the company must return information in their possession or control to the organization upon separation and/or retirement.
i. Information owners must enforce the retention, archiving and destruction of information, and communicate these periods to relevant parties.
a. *Information Archiving*
i. Archiving is defined as secured storage of information such that the information is rendered inaccessible by authorized users in the ordinary course of business but can be retrieved by an administrator designated by company management.
1. Physical (e.g., paper) records must be archived in secured storage (onsite or offsite) and clearly labeled in archive boxes naming the information owner.
1. Electronic records must be archived with strict access controls set by the information owner and appropriate to secure the confidentiality, integrity and accessibility of the information.
i. The default archiving period of information shall be 7 years unless an approved exception permits a longer or shorter period. Exceptions must be requested by the information owner.
1. As a guideline, an archiving period of more than 7 years may be granted for information with a vital historical purpose such as corporate records, contracts, and technical/trade secrets.
1. As a guideline, an archiving period of less than 7 years may be granted for information with a limited business purpose such as email, travel itineraries, pre-trip advisories, or to comply with specific legal, contractual and/or regulatory requirements (e.g., PCI DSS, GDPR, etc.)
i. Information must be destroyed (defined below) at the end of the elapsed archiving period.
a. *Information Destruction*
i. Destruction is defined as the physical or technical destruction sufficient to render the information contained in the document irretrievable by ordinary commercially-available means.
i. The organization must maintain and enforce a detailed list of approved destruction methods appropriate for each type of information archived, whether in physical storage media such as CD-ROMs, DVDs, backup tapes, hard drives, mobile devices, portable drives or in database records or backup files. Physical information in paper form must be shredded using an authorized shredding device; waste must be periodically removed by approved personnel.
a. Retention and archival periods for information that is created, processed, stored and used by the organization is defined in Appendix A, “Retention Periods.”
\pagebreak
# Appendix A: Retention Periods
+------------------+-------------------+------------------+------------------+-----------------+
| Information Type | Information Owner | Storage Location | Retention Period | Archival Period |
+==================+===================+==================+==================+=================+
| | | | | |
| | | | | |
+------------------+-------------------+------------------+------------------+-----------------+
| | | | | |
| | | | | |
+------------------+-------------------+------------------+------------------+-----------------+